❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 1 June 2024Security Boulevard

Compromising ByteDance’s Rspack using GitHub Actions Vulnerabilities

31 May 2024 at 16:23

Overview Recently, we identified several critical Pwn Request vulnerabilities within GitHub Actions used by the Rspack repository. These vulnerabilities could allow an external attacker to submit a malicious pull request, without the requirement of being a prior contributor to the repository, and compromise the following secrets: NPM Deployment Token Compromise: Exploitation of the Pwn Request […]

The post Compromising ByteDance’s Rspack using GitHub Actions Vulnerabilities appeared first on Praetorian.

The post Compromising ByteDance’s Rspack using GitHub Actions Vulnerabilities appeared first on Security Boulevard.

Before yesterdaySecurity Boulevard

NIST Struggles with NVD Backlog as 93% of Flaws Remain Unanalyzed

29 May 2024 at 17:32
NIST CSF vulnerabilities ransomware

The funding cutbacks announced in February have continued to hobble NIST’s ability to keep the government’s National Vulnerabilities Database (NVD) up to date, with one cybersecurity company finding that more than 93% of the flaws added have not been analyzed or enhanced, a problem that will make organizations less safe. β€œWith the recent slowdown of..

The post NIST Struggles with NVD Backlog as 93% of Flaws Remain Unanalyzed appeared first on Security Boulevard.

PyPI crypto-stealer targets Windows users, revives malware campaign

By: Ax Sharma
29 May 2024 at 08:00

Sonatype has discovered 'pytoileur', a malicious PyPI package hiding code that downloads and installs trojanized Windows binaries capable of surveillance, achieving persistence, and crypto-theft. Our discovery of the malware led us to probe into similar packages that are part of a wider, months-long "Cool package" campaign.

The post PyPI crypto-stealer targets Windows users, revives malware campaign appeared first on Security Boulevard.

Alert: Google Chrome Zero-Day Patch Fixes Critical Flaw

27 May 2024 at 12:08

In recent cybersecurity news, Google has swiftly addressed a critical security concern by releasing an emergency update for its Chrome browser. This update targets the third zero-day vulnerability detected in less than a week. Let’s have a look at the details of this Google Chrome zero-day patch and understand its implications for user safety. Β  […]

The post Alert: Google Chrome Zero-Day Patch Fixes Critical Flaw appeared first on TuxCare.

The post Alert: Google Chrome Zero-Day Patch Fixes Critical Flaw appeared first on Security Boulevard.

Understanding and Mitigating Privilege Escalation Vulnerabilities in the Linux Kernel

27 May 2024 at 05:00

Privilege escalation is a critical security issue in Linux systems, potentially leading to full system compromise. The Dirty COW and Dirty Pipe vulnerabilities are popular examples of privilege escalation vulnerabilities in the Linux kernel. Modernize your Linux patching approach with an automated and rebootless patching solution, KernelCare Enterprise. Like any complex software, the Linux kernel […]

The post Understanding and Mitigating Privilege Escalation Vulnerabilities in the Linux Kernel appeared first on TuxCare.

The post Understanding and Mitigating Privilege Escalation Vulnerabilities in the Linux Kernel appeared first on Security Boulevard.

Black Basta Ascension Attack Redux β€” can Patients Die of Ransomware?

24 May 2024 at 13:45
Psychedelic doctor image, titled β€œBad Medicine”

Inglorious Basta(rds): 16 days on, huge hospital system continues to be paralyzed by ransomwareβ€”and patient safety is at risk.

The post Black Basta Ascension Attack Redux β€” can Patients Die of Ransomware? appeared first on Security Boulevard.

Customized Vulnerability Management Dashboard for CISOs

By: Alibha
24 May 2024 at 05:53

CISOs require a central hub for visualizing critical security data. Strobes RBVM empowers you to construct impactful CISO dashboards, transforming complex information into actionable insights. This guide equips you with...

The post Customized Vulnerability Management Dashboard for CISOs appeared first on Strobes Security.

The post Customized Vulnerability Management Dashboard for CISOs appeared first on Security Boulevard.

The Role of Real-Time Incident Response in Mitigating Conversation Hijacking Attacks

By: Leigh Dow
21 May 2024 at 08:45

Communications hijacking, also known as β€œconversation hijacking,” has emerged as a significant threat to organizations worldwide. This form of cyberattack involves unauthorized interception or redirection of communication channels, leading to data breaches, financial loss, and damage to an organization’s reputation. Real-time incident response is a critical strategy in mitigating the risks associated with conversation hijacking […]

The post The Role of Real-Time Incident Response in Mitigating Conversation Hijacking Attacks appeared first on BlackCloak | Protect Your Digital Lifeβ„’.

The post The Role of Real-Time Incident Response in Mitigating Conversation Hijacking Attacks appeared first on Security Boulevard.

Latest Ubuntu Security Updates: Fixing Linux Kernel Vulnerabilities

21 May 2024 at 05:00

Several vulnerabilities have been discovered in the Linux kernel that could lead to privilege escalation, denial of service, or information leaks. The Ubuntu security team has addressed these issues in the latest Ubuntu security updates for multiple releases. In this article, we will explore some of the vulnerabilities fixed and learn how to apply updates […]

The post Latest Ubuntu Security Updates: Fixing Linux Kernel Vulnerabilities appeared first on TuxCare.

The post Latest Ubuntu Security Updates: Fixing Linux Kernel Vulnerabilities appeared first on Security Boulevard.

LiteSpeed Cache Bug Exploit For Control Of WordPress Sites

20 May 2024 at 10:30

In recent developments concerning WordPress security, a significant vulnerability has come to light in the widely used LiteSpeed Cache plugin. This LiteSpeed cache bug, labeled CVE-2023-40000, poses a substantial risk to WordPress site owners, as it allows threat actors to exploit websites, gaining unauthorized access and control. Let’s delve into the details of this vulnerability, […]

The post LiteSpeed Cache Bug Exploit For Control Of WordPress Sites appeared first on TuxCare.

The post LiteSpeed Cache Bug Exploit For Control Of WordPress Sites appeared first on Security Boulevard.

IoT Vulnerabilities and BotNet Infections: A Risk for Executives

16 May 2024 at 07:30

The Internet of Things (IoT) has become a cornerstone of business innovation and efficiency. However, the rapid proliferation of IoT devices also introduces significant cybersecurity risks, particularly in the form of IoT vulnerabilities and botnet infections. These risks pose a direct threat to executives, who often use these technologies both personally and professionally. IoT devices […]

The post IoT Vulnerabilities and BotNet Infections: A Risk for Executives appeared first on BlackCloak | Protect Your Digital Lifeβ„’.

The post IoT Vulnerabilities and BotNet Infections: A Risk for Executives appeared first on Security Boulevard.

Addressing glibc Vulnerabilities in EOL Ubuntu

16 May 2024 at 05:00

Recently, the Ubuntu security team has fixed multiple security issues discovered in the GNU C library, commonly known as glibc. If left unaddressed, this can leave your system exposed to attackers who exploit these glibc vulnerabilities. The glibc library provides the foundation for many programs on your system. Therefore, it is crucial to patch these […]

The post Addressing glibc Vulnerabilities in EOL Ubuntu appeared first on TuxCare.

The post Addressing glibc Vulnerabilities in EOL Ubuntu appeared first on Security Boulevard.

Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert

16 May 2024 at 03:00

In the digital realm, security is paramount, especially when it comes to the applications we use daily. Recently, concerns have surfaced regarding vulnerabilities in popular Android applications available on the Google Play Store. Revelations by the Microsoft Threat Intelligence team have unearthed a WPS Office exploit dubbed the Dirty Stream attack, casting a spotlight on […]

The post Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert appeared first on TuxCare.

The post Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert appeared first on Security Boulevard.

15-Year-Old Ebury Botnet Compromised 400,000 Linux Servers

15 May 2024 at 16:30
botnets, DDOS attacks, FBI IPStorm botnet DDoS

The operators behind the Ebury server-side malware botnet have been doing business since at least 2009 and, according to the threat researchers who have been tracking it for the last decade, are stronger and more active than ever. The malware has compromised at least 400,000 Linux servers over the past 15 years, with about 100,000..

The post 15-Year-Old Ebury Botnet Compromised 400,000 Linux Servers appeared first on Security Boulevard.

Managing Cyber Risk in Exit Strategy Planning

15 May 2024 at 08:15

Exit Planning is the strategic process of preparing for the eventual transfer or sale of a business. It takes into account the business owner’s personal and financial goals and involves decisions and actions that enable a smooth and organized exit from the business.Β  Exit planning presents a challenging time for business owners. As they prepare […]

The post Managing Cyber Risk in Exit Strategy Planning appeared first on BlackCloak | Protect Your Digital Lifeβ„’.

The post Managing Cyber Risk in Exit Strategy Planning appeared first on Security Boulevard.

Thunderbird Vulnerabilities Fixed in Ubuntu and Debian

15 May 2024 at 05:00

In recent Ubuntu and Debian security updates, several vulnerabilities have been addressed in Thunderbird, the popular open-source mail and newsgroup client. Attackers could use these vulnerabilities to cause a denial of service, execute arbitrary code, or disclose sensitive information. The Ubuntu security team has released the patches for Ubuntu 23.10, Ubuntu 22.04 LTS, and Ubuntu […]

The post Thunderbird Vulnerabilities Fixed in Ubuntu and Debian appeared first on TuxCare.

The post Thunderbird Vulnerabilities Fixed in Ubuntu and Debian appeared first on Security Boulevard.

CISA Alert: GitLab Password Exploit – Act Now For Protection

15 May 2024 at 03:00

In the realm of cybersecurity, vigilance is paramount. Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) flagged a critical vulnerability in GitLab, a popular platform for collaborative software development. This GitLab password exploit tracked as CVE-2023-7028, has been actively exploited in the wild, posing significant risks to organizations utilizing GitLab for their development workflows. […]

The post CISA Alert: GitLab Password Exploit – Act Now For Protection appeared first on TuxCare.

The post CISA Alert: GitLab Password Exploit – Act Now For Protection appeared first on Security Boulevard.

FBI/CISA Warning: β€˜Black Basta’ Ransomware Gang vs. Ascension Health

13 May 2024 at 13:08
Closeup photo of street go and stop signage displaying Stop

Π‘ΡƒΠ΄Π΅Ρ‚! Russian ransomware rascals riled a Roman Catholic healthcare organization.

The post FBI/CISA Warning: β€˜Black Basta’ Ransomware Gang vs. Ascension Health appeared first on Security Boulevard.

Hardware Level Vulnerabilities, Revisited

13 May 2024 at 04:00

In August of last year, I examined several CPU bugs that posed serious security threats. The mitigations for these vulnerabilities generally involved either incorporating additional instructions or opting for alternative CPU instructions – strategies that lead to diminished system performance overall. My argument was that such vulnerabilities effectively revert your infrastructure to the technological level […]

The post Hardware Level Vulnerabilities, Revisited appeared first on TuxCare.

The post Hardware Level Vulnerabilities, Revisited appeared first on Security Boulevard.

HPE Aruba Vulnerabilities: Prevent Systems From RCE Attacks

13 May 2024 at 03:00

Recently, HPE Aruba Networking, formerly known as Aruba Networks, has encountered significant security challenges. Vulnerabilities in their ArubaOS, the proprietary network operating system, have been identified, posing serious risks, including remote code execution (RCE). In this article, we delve into the details of these HPE Aruba vulnerabilities, their implications, and the recommended actions to mitigate […]

The post HPE Aruba Vulnerabilities: Prevent Systems From RCE Attacks appeared first on TuxCare.

The post HPE Aruba Vulnerabilities: Prevent Systems From RCE Attacks appeared first on Security Boulevard.

Backdoors and Miners Amid eScan Antivirus Backdoor Exploit

10 May 2024 at 03:00

Recently, a wave of malware attacks has surfaced, exploiting vulnerabilities in the update mechanism of the eScan antivirus software. This eScan antivirus backdoor exploit distributes backdoors and cryptocurrency miners, such as XMRig, posing a significant threat to large corporate networks. In this blog, we’ll look into the details of this eScan antivirus backdoor exploit and […]

The post Backdoors and Miners Amid eScan Antivirus Backdoor Exploit appeared first on TuxCare.

The post Backdoors and Miners Amid eScan Antivirus Backdoor Exploit appeared first on Security Boulevard.

RSAC 2024 Day 2: IoT Security Questions (and Answers)

8 May 2024 at 14:54

RSA Conference delivers in terms of interesting dialogues with other cybersecurity professionals, and this year while there is not much on the conference agenda related to IoT security there is a lot of discussion about it.Β  Whether it’s the UK’s Product Security law going into effect at the end of April, the growing focus by […]

The post RSAC 2024 Day 2: IoT Security Questions (and Answers) appeared first on Viakoo, Inc.

The post RSAC 2024 Day 2: IoT Security Questions (and Answers) appeared first on Security Boulevard.

RSAC 2024: IoT Security Questions (and Answers)

7 May 2024 at 13:49

The 2024 RSA Conference is underway, and Viakoo is out in force.Β  During the conference as we meet with customers, prospects, media, and analysts I will try to cherry pick some of the more interesting questions related to IoT Security.Β  Over the past year the number of IoT security breaches and incidents has continued to […]

The post RSAC 2024: IoT Security Questions (and Answers) appeared first on Viakoo, Inc.

The post RSAC 2024: IoT Security Questions (and Answers) appeared first on Security Boulevard.

❌
❌