Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Dangerous vulnerabil ...

 Threats

The gaming community is discussing a recent vulnerability in the Dark Souls III videogame. This RCE vulnerability allows attackers to remotely execute arbitrary code on a victims computer. Apparently, the vulnerability also affects earlier games in the Dark Soul series: because of this the developers have taken the   show more ...

unusual step of temporarily deactivating PvP servers across Dark Souls Remastered, Dark Souls II, and Dark Souls III. According to the developers, they also plan to turn off servers for Dark Souls: Prepare To Die as well. Players fear that the same vulnerability could also affect the upcoming Elden Ring game, which is thought to use the same infrastructure. The bug is relevant only for PC users, so Xbox and PlayStation are unaffected. Why Dark Souls vulnerability is so dangerous This vulnerability allows an attacker to execute almost any program on the victims computer, so theyre able to steal confidential data or execute any program they wish (including installing malware). You can find a demonstration of the exploit in the Twitch stream of the player named The_Grim_Sleeper in which an unknown person launched a PowerShell script on the streamers computer that used the Windows Narrator engine to read out critical notes about the gameplay. What is the chance that Dark Souls vulnerability will be exploited ITW? The details of the exploit for this vulnerability are not available to the general public, at least not yet. Despite the ethically dubious way of drawing attention to the problem, the person behind the attack apparently was not trying to cause any real harm. Judging by the discussion in the Dark Souls community, the creator of the exploit has been trying to inform the games developers about this serious vulnerability for some time, but they had ignored his messages. Thats why he decided to hack a popular streamer right during the streaming session. However, this information is not 100% reliable, in reality everything may not be so straight-forward. For example, the creator of the exploit has already shared information about the vulnerability with the developers of the Blue Sentinel plugin, a mod for Dark Souls designed to counteract cheats. And one can only guess who else could get this information. Also, once demonstrated, other hackers may try to replicate the exploit and use it to cause real harm to players. There are various possible scenarios here: attackers can use it to steal passwords from game accounts or crypto wallets, install good old ransomware, hidden miners, and much more. How to stay safe from Dark Souls vulnerability? Apparently, FromSoftware is currently trying to solve the problem. Lets hope they can fix the vulnerability quickly. However, in the meantime we recommend using high-quality security solutions for each device. Thanks to a special gaming mode, our antiviruses protect against all kinds of threats, including the exploitation of vulnerabilities, while consuming a minimum of PC resources and without interfering with the gameplay.

 Threat Actors

Earth Lusca, allegedly linked with the Chinese Winnti group, was observed targeting high-profile organizations and individuals in a coordinated espionage campaign. The group also staged financially motivated attacks against gambling entities in China and different cryptocurrency platforms as well. The best defense   show more ...

against such threats would be to focus on shared threat intelligence and using provided IOCs for better detection.

 Threat Actors

Researchers laid bare a massive phishing campaign targeting over fifteen renewable energy and industrial technology firms to steal the login credentials of people. The researcher has not linked this campaign to any particular actors, however, the evidence points to two clusters of activity, one is from APT28 and   show more ...

another one is from Konni. Targeted energy firms and other connected industries should be taking the right measures to protect themselves.

 Malware and Vulnerabilities

The vulnerabilities can cause the termination of the Traffic Management Microkernel, can lead to an increase in memory resource utilization, freezing virtual servers, or executing JavaScript code.

 Malware and Vulnerabilities

A security hole in Box, the cloud-based file-sharing service, paved the way for hackers to take over control for user devices using an SMS text code for log-in verification. The authentication can be completed using the time-based OTP linked with their own Box account. Researchers recommend limiting the access and monitoring of data for better protection.

 Threat Actors

Trend Micro experts surmised a connection between the FIN8 APT group and a new ransomware strain called White Rabbit, which was spotted targeting a local U.S. bank last month. Hackers threaten to send the stolen data to data protection authorities if a ransom demand isn’t met, which may result in imposed penalties   show more ...

by the GDPR. Security teams are suggested to create an incident response playbook for attack prevention and mitigation.

 Trends, Reports, Analysis

The volume of publicly reported data compromises in the US soared 68% year-on-year to a record high of 1862, according to new data from the Identity Theft Resource Center (ITRC).

 Breaches and Incidents

Memorial Health System was hit with ransomware in the early hours of August 15, 2021. The incident forced the health system to suspend user access to all IT applications related to its operations.

 Malware and Vulnerabilities

Researchers have uncovered details about a new malicious IRC bot, programmed in Golang, that is being used to launch DDoS attacks against Korean users. Attackers are distributing the malware via file-sharing websites such as Korean WebHards. It is recommended to stay alert when downloading files from a file-sharing website and use official sources for download.

 Feed

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

 Feed

The Ubiquiti UniFi Network Application versions 5.13.29 through 6.5.53 are affected by the Log4Shell vulnerability whereby a JNDI string can be sent to the server via the remember field of a POST request to the /api/login endpoint that will cause the server to connect to the attacker and deserialize a malicious Java   show more ...

object. This results in OS command execution in the context of the server application. This Metasploit module will start an LDAP server that the target will need to connect to.

 Feed

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

 Feed

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.

 Feed

Ubuntu Security Notice 5243-2 - USN-5243-1 fixed a vulnerability in aide. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. David Bouman discovered that AIDE incorrectly handled base64 operations. A local attacker could use this issue to cause AIDE to crash, resulting in a denial of service, or possibly execute arbitrary code.

 Feed

Red Hat Security Advisory 2022-0204-04 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include deserialization and integer overflow vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0232-02 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a heap overflow vulnerability.

 Feed

Red Hat Security Advisory 2022-0211-04 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include deserialization and integer overflow vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0185-03 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include deserialization and integer overflow vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0233-02 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include deserialization and integer overflow vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0209-02 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include deserialization and integer overflow vulnerabilities.

 Feed

Red Hat Security Advisory 2022-0231-03 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include heap overflow and privilege escalation vulnerabilities.

 Feed

Ubuntu Security Notice 5244-1 - Daniel Onaca discovered that DBus contained a use-after-free vulnerability, caused by the incorrect handling of usernames sharing the same UID. An attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.

 Feed

Ubuntu Security Notice 5248-1 - Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, trick a user into accepting unwanted   show more ...

permissions, conduct header splitting attacks, conduct spoofing attacks, bypass security restrictions, confuse the user, or execute arbitrary code.

 Feed

Social engineering campaigns involving the deployment of the Emotet malware botnet have been observed using "unconventional" IP address formats for the first time in a bid to sidestep detection by security solutions. This involves the use of hexadecimal and octal representations of the IP address that, when processed by the underlying operating systems, get automatically converted "to the dotted

 Feed

The maintainers of the Rust programming language have released a security update for a high-severity vulnerability that could be abused by a malicious party to purge files and directories from a vulnerable system in an unauthorized manner. "An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete,

 Feed

I recently hopped on the Lookout podcast to talk about virtual private networks (VPNs) and how they've been extended beyond their original use case of connecting remote laptops to your corporate network. Even in this new world where people are using personal devices and cloud apps, VPN continues to be the go-to solution for remote access and cloud access. After my conversation with Hank Schless,

 Feed

Misconfigurations in smart contracts are being exploited by scammers to create malicious cryptocurrency tokens with the goal of stealing funds from unsuspecting users. The instances of token fraud in the wild include hiding 99% fee functions and concealing backdoor routines, researchers from Check Point said in a report shared with The Hacker News. Smart contracts are programs stored on the

2022-01
Aggregator history
Monday, January 24
SAT
SUN
MON
TUE
WED
THU
FRI
JanuaryFebruaryMarch