Aggregator
SysReptor: Open-source penetration testing reporting platform
SysReptor is a customizable open-source penetration testing reporting platform built for pentesters, red teamers, and cybersecurity professionals. You can optimize your workflow by simplifying, automating, and personalizing your reports. “SysReptor is an easy-to-use tool for pentesters and simplifies pentest reporting. Reports are designed as HTML/CSS and rendered to PDFs. Pentesters can write their reports in markdown format. We actively maintain it and release new features continuously (from note-taking to encrypted archiving, concurrent editing, version histories, … More →
The post SysReptor: Open-source penetration testing reporting platform appeared first on Help Net Security.
JVN: acmailerにおけるクロスサイトスクリプティングの脆弱性
Microsoft Patch Tuesday, February 2025 Edition
比亚迪为低端车型配备天神之眼
Silent breaches are happening right now, most companies have no clue
The breaches and ransomware attacks of 2024 highlighted systemic vulnerabilities, demonstrating how third-party and fourth-party dependencies amplify risks across industries, according to a Black Kite report. Researchers revealed how silent breaches underscore the risk posed by unseen vulnerabilities in third-party networks. By exploiting these hidden weaknesses, attackers disrupted individual organizations and exposed the fragility of entire supply chains. Third-party breach incidents in 2024 Unauthorized network access accounted for more than 50% of publicly disclosed third-party … More →
The post Silent breaches are happening right now, most companies have no clue appeared first on Help Net Security.
JVN: 2N製2N Access Commanderにおける複数の脆弱性
お知らせ:JPCERT/CC Eyes「Ivanti Connect Secureの脆弱性を利用して設置されたマルウェアSPAWNCHIMERA」
NetGear发布安全公告提醒用户修补关键WiFi路由器漏洞
Netgear修复了两个影响多个WiFi路由器模型的关键漏洞,并敦促客户尽快将其设备更新为最新的固件。安全漏洞会影响多个WiFi 6接入点(WAX206,WAX214V2和WAX220)和Nighthawk Pro游戏路由器模型(XR1000,XR1000V2,XR500)。
尽管没有更多有关这两个漏洞的详细信息,但可以确定的是未经验证的威胁分子可以利用它们进行远程代码执行(以PSV-2023-0039的内部跟踪)和身份验证(PSV-2021-0117)在不需要用户交互的低复杂性攻击中。
该公司在周末发布的报告中说道:“ Netgear强烈建议相关用户尽快下载最新的固件。”下表列出了所有弱势路由器模型和带有安全补丁的固件版本。
要下载并安装用于NetGear路由器的最新固件,用户必须通过以下步骤:
1.访问Netgear支持。
2.在搜索框中键入您的型号,然后在出现后立即从下拉菜单中选择您的型号。
3.如果您看不到下拉菜单,请确保正确输入型号或选择产品类别以浏览产品型号。
4.点击下载。
5.在当前版本下,选择第一个下载其标题以固件版本开头。
6.点击发行说明。
7.按照发行说明中的说明下载并安装新的固件。
该公司随后表示如果用户没有完成所有建议的步骤,则未经验证的RCE脆弱性仍然存在,Netgear对任何后果概不负责。
去年7月,NetGear还提醒客户立即更新到最新的固件,以进行补丁存储的跨站点脚本(XSS)和身份验证旁路漏洞,影响了几种WiFi 6路由器模型。
一个月前,安全研究人员在Netgear WNR614 N300中揭示了六个不同严重程度的漏洞,这是一条在房屋用户和小型企业中流行的路由器。
CEOs must act now to embrace AI or risk falling behind
While 4 out of 5 CEOs recognize AI’s potential, many worry gaps in their understanding will impact strategic decisions, risking missed opportunities and falling behind competitors, according to Cisco. Yet, CEOs are not standing still. With support from IT leaders and trusted partners, they plan to empower their people, modernize infrastructure, and strengthen cybersecurity to sharpen their competitive edge in an AI-driven future. “Leaders who act decisively today to build resilient, future-proofed networks will be … More →
The post CEOs must act now to embrace AI or risk falling behind appeared first on Help Net Security.
The Alarming Backdoor Hiding in 2 Chinese Patient Monitors
A hidden reverse backdoor in low-cost patient vital sign monitors used globally is hardcoded with an IP address connecting to a Chinese government-funded education and research network, which poses both privacy and potential safety concerns, said security researcher Jason Sinchak of ELTON.
US VP Vance Calls for Less Regulation at AI Action Summit
Europe must view developments in artificial intelligence with optimism, rather than trepidation, U.S. Vice President JD Vance told EU leaders during the AI Action Summit. He said the EU's tendency to overregulate technology is costing American businesses billions of dollars.
Tines Raises $125M to Expand Security Automation, Agentic AI
Security automation firm Tines has secured $125 million in Series C funding, pushing its valuation to $1.125 billion. CEO Eoin Hinchy says the company will invest in AI, expand beyond security into IT and infrastructure, and enhance agentic AI capabilities to drive mission-critical automation.
How Trump's Funding Freeze Threatens US Port Cybersecurity
President Donald Trump's federal funding freeze threatens to significantly weaken U.S. maritime cybersecurity efforts as China expands its control over global ports, experts warned in congressional testimony. Attacks on ports could disrupt supply chains and destabilize global trade.
Kimsuky Hackers使用新的自定义RDP包装器进行远程访问
被称为Kimsuky的朝鲜黑客组织在最近的攻击中被发现使用定制的RDP包装器和代理工具直接访问受感染的机器。
发现该活动的AhnLab安全情报中心(ASEC)表示,朝鲜黑客现在正使用一套多样化的定制远程访问工具,而不再仅仅依赖于PebbleDash等嘈杂的后门,但PebbleDash目前仍在使用中,此举也是Kimsuky改变策略的手段之一。
Kimsuky最新的攻击链
最新的感染链始于一封鱼叉式网络钓鱼电子邮件,其中包含伪装成PDF或Word文档的恶意快捷方式(. lnk)文件附件。这些电子邮件包含收件人的姓名和正确的公司名称,表明Kimsuky在攻击前进行了侦察。
打开.LNK文件会触发PowerShell或Mshta从外部服务器检索额外的负载,包括:
·PebbleDash,一个已知的Kimsuky后门,提供初始系统控制。
·一个修改版本的开源RDP包装工具,支持持久的RDP访问和安全措施绕过。
·代理工具绕过私有网络的限制,允许攻击者访问系统,即使直接RDP连接被阻止。
自定义RDP包装器
RDP Wrapper是一个合法的开源工具,用于在Windows版本(如Windows Home)上启用本地不支持的远程桌面协议(RDP)功能。
它充当中间层,允许用户在不修改系统文件的情况下启用远程桌面连接。Kimsuky的版本改变了导出功能,以绕过反病毒检测,并可能区分其行为,足以逃避基于签名的检测。
自定义RDP包装器导出功能
使用自定义RDP包装器的主要优点是规避检测,因为RDP连接通常被视为合法的,允许Kimsuky在雷达下停留更长时间。
此外,与通过恶意软件进行shell访问相比,它提供了更舒适的基于gui的远程控制,并且可以通过中继绕过防火墙或NAT限制,允许从外部进行RDP访问。
ASEC报告说,一旦Kimsuky在网络上站稳脚跟,他们就会放弃二次有效载荷。其中包括一个键盘记录器,它捕获击键并将其存储在系统目录中的文本文件中,一个infostealer(强制复制)提取保存在web浏览器上的凭据,以及一个基于powershell的ReflectiveLoader,它允许在内存中执行有效负载。
整体来看,Kimsuky作为一个持续不断的威胁,也是朝鲜致力于收集情报最多产的网络间谍威胁组织之一。根据ASEC的最新发现表明,其威胁组织正转向更隐蔽的远程访问方法,以延长在受损网络中的停留时间。