Aggregator
CVE-2024-45819 | Xen libxl information disclosure (Nessus ID 210883)
Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware
Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify a sophisticated malware delivery campaign. A link that was disguised as a legitimate SharePoint notification was included in the emails that were sent out at the beginning of the attack. The engine flagged the message as malicious based on several factors: […]
The post Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace
Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the vulnerability of the platform to supply chain attacks similar to those previously seen in the npm community. Malicious actors are increasingly exploiting npm packages to distribute malicious code, mirroring tactics previously used in VSCode extensions that involve the npm package etherscancontracthandler, […]
The post Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2006-6363 | BlueSocket Bsc 2100 up to 5.1 admin.pl ad_name cross site scripting (EDB-29221 / XFDB-30735)
Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload
TA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email containing a RAR archive, which included a decoy PDF, a malicious LNK file disguised as a PDF, and an ADS file with PowerShell code. This technique, common for TA397, leverages NTFS ADS to establish persistence and deploy further malware like wmRAT […]
The post Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2016-4226 | Adobe Flash Player prior 11.2.202.632/18.0.0.366/22.0.0.209 use after free (APSB16-25 / EDB-40308)
Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products
CISA предупреждает: E2EE – ваш последний шанс избежать цифровой слежки
Loods verwoest bij brand op Prinses Margrietkazerne
BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes
BADBOX is a cybercriminal operation infecting Android devices like TV boxes and smartphones with malware before sale, which are often sold through reputable retailers and pose a significant threat to users due to their pre-installed malicious software, making detection challenging. It previously thought eradicated has resurfaced with a significantly expanded reach, infecting over 192,000 Android […]
The post BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2000-0909 | University of Washington Pine 4.0.4/4.10/4.21 FROM memory corruption (EDB-20237 / Nessus ID 61859)
Legit Security provides insights into the enterprise’s secrets posture
Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions taken to remediate secrets. In addition, Legit released new discovery and remediation capabilities for secrets found within developers’ personal GitHub repositories. Secrets – from API keys and tokens to credentials and PII – play a vital … More →
The post Legit Security provides insights into the enterprise’s secrets posture appeared first on Help Net Security.
CVE-2007-0235 | libgtop 2.14.5 glibtop_get_proc_map_s memory corruption (EDB-29458 / Nessus ID 67555)
Attackers exploiting a patched FortiClient EMS vulnerability in the wild
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-12356 BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA Releases Eight Industrial Control Systems Advisories
CISA released eight Industrial Control Systems (ICS) advisories on December 19, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-354-01 Hitachi Energy RTU500 series CMU
- ICSA-24-354-02 Hitachi Energy SDM600
- ICSA-24-354-03 Delta Electronics DTM Soft
- ICSA-24-354-04 Siemens User Management Component
- ICSA-24-354-05 Tibbo AggreGate Network Manager
- ICSA-24-354-06 Schneider Electric Accutech Manager
- ICSA-24-354-07 Schneider Electric Modicon Controllers
- ICSMA-24-354-01 Ossur Mobile Logic Application
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.