Aggregator
Loods verwoest bij brand op Prinses Margrietkazerne
BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes
BADBOX is a cybercriminal operation infecting Android devices like TV boxes and smartphones with malware before sale, which are often sold through reputable retailers and pose a significant threat to users due to their pre-installed malicious software, making detection challenging. It previously thought eradicated has resurfaced with a significantly expanded reach, infecting over 192,000 Android […]
The post BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2000-0909 | University of Washington Pine 4.0.4/4.10/4.21 FROM memory corruption (EDB-20237 / Nessus ID 61859)
Legit Security provides insights into the enterprise’s secrets posture
Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions taken to remediate secrets. In addition, Legit released new discovery and remediation capabilities for secrets found within developers’ personal GitHub repositories. Secrets – from API keys and tokens to credentials and PII – play a vital … More →
The post Legit Security provides insights into the enterprise’s secrets posture appeared first on Help Net Security.
CVE-2007-0235 | libgtop 2.14.5 glibtop_get_proc_map_s memory corruption (EDB-29458 / Nessus ID 67555)
Attackers exploiting a patched FortiClient EMS vulnerability in the wild
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-12356 BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA Releases Eight Industrial Control Systems Advisories
CISA released eight Industrial Control Systems (ICS) advisories on December 19, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-354-01 Hitachi Energy RTU500 series CMU
- ICSA-24-354-02 Hitachi Energy SDM600
- ICSA-24-354-03 Delta Electronics DTM Soft
- ICSA-24-354-04 Siemens User Management Component
- ICSA-24-354-05 Tibbo AggreGate Network Manager
- ICSA-24-354-06 Schneider Electric Accutech Manager
- ICSA-24-354-07 Schneider Electric Modicon Controllers
- ICSMA-24-354-01 Ossur Mobile Logic Application
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
NIST’s International Cybersecurity and Privacy Engagement Update – New Translations
Recorded Future CEO Calls Russia’s “Undesirable” Listing a “Compliment”
Command Injection Exploit For PHPUnit before 4.8.28 and 5.x before 5.6.3 [Guest Diary], (Tue, Dec 17th)
От Fortune 500 до частных лиц: GPS-трекеры раскрыли корпоративные тайны
Europol Details on How Cyber Criminals Exploit legal businesses for their Economy
Europol has published a groundbreaking report titled “Leveraging Legitimacy: How the EU’s Most Threatening Criminal Networks Abuse Legal Business Structures.” The report uncovers the alarming extent to which organized crime groups exploit legitimate business structures to strengthen their power, evade law enforcement, and expand their illegal activities. Building on the findings of its April 2024 study, “Decoding […]
The post Europol Details on How Cyber Criminals Exploit legal businesses for their Economy appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.