Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for The Week’s Top Vul ...

 Cyber News

Cyble researchers had a busy week, investigating 19 vulnerabilities in the week ended Oct.1 and flagging eight of them as high priority. Cyble’s weekly IT vulnerability report also noted that researchers observed 10 exploits being discussed on dark web and cybercrime forums, including an OpenSSH vulnerability with 8   show more ...

million exposures and claimed zero days in Apple and Android. Vulnerabilities in SolarWinds, Microsoft, Zimbra, WordPress and Fortinet were also discussed by threat actors on underground forums. Optigo, NVIDIA, Adobe and Linux CUPS are Top Priorities The report from Cyble Research & Intelligence Labs (CRIL) flagged eight vulnerabilities in four products for security teams to prioritize: CVE-2024-41925 & CVE-2024-45367: ONS-S8 Spectra Aggregation Switch The ONS-S8 Spectra Aggregation Switch is a network management device from Optigo Networks that is used to deploy passive optical networking (PON) in intelligent buildings. The PHP Remote File Inclusion (RFI) and weak authentication vulnerabilities were also the subject of an advisory from CISA because of their low attack complexity and the product’s use in critical infrastructure. CVE-2024-0132: NVIDIA Container Toolkit This high-severity Time-of-check Time-of-Use (TOCTOU) vulnerability in the NVIDIA Container Toolkit could be used for container escape attacks and to gain full access to the host system, leading to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. CVE-2024-34102: Adobe Commerce This 9.8-severity Improper Restriction of XML External Entity Reference ('XXE') vulnerability in Adobe Commerce/Magento could be exploited by sending a crafted XML document that references external entities, leading to arbitrary code execution. Researchers have observed multiple Adobe Commerce and Magento stores compromised by threat actors using the vulnerability, and it’s also being discussed on cybercrime forums. CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177: CUPS Vulnerabilities These recently disclosed vulnerabilities – CVE-2024-47076 (libcupsfilters), CVE-2024-47175 (libppd), CVE-2024-47176 (cups-browsed) and CVE-2024-47177 (cups-filters) – impact CUPS (Common UNIX Printing System), a modular printing system designed for Unix-like operating systems. Under certain conditions, attackers could chain the vulnerabilities in multiple components of the CUPS open-source printing system to execute arbitrary code remotely. Dark Web Exploits Noted by Cyble Cyble researchers observed 10 or more vulnerabilities and exploits discussed in Telegram channels and on cybercrime forums, suggesting that security teams should give these issues a higher priority. CVE-2024-28987: A critical vulnerability in SolarWinds Web Help Desk (WHD) software created by hardcoded developer login credentials. CVE-2024-38200: A critical vulnerability in Microsoft Office created by improper handling of certain document properties, which could potentially expose NTLM hashes and other sensitive information. CVE-2023-32413: This vulnerability in various Apple operating systems comes from from improper synchronization when multiple processes use shared resources concurrently, which can lead to unexpected system behavior. CVE-2024-43917: This critical SQL Injection vulnerability affects the TI WooCommerce Wishlist plugin for WordPress, in versions up to 2.8.2. CVE-2024-45519: A critical Remote Code Execution (RCE) vulnerability was identified in the postjournal service of the Zimbra Collaboration Suite, a widely used email and collaboration platform. Cyble researchers also issued a separate report on the Zimbra vulnerability, and CISA added it to the agency’s Known Exploited Vulnerabilities catalog. CVE-2024-8275: A critical SQL injection vulnerability in the Events Calendar Plugin for WordPress that affects all versions up to and including 6.6.4. CVE-2024-6387: A threat actor offered a list of IP addresses that may be affected by this vulnerability, which is also known as RegreSSHion, a critical remote code execution (RCE) vulnerability in the OpenSSH secure networking utilities. Cyble’s Odin vulnerability search service shows more than 8 million web-facing hosts exposed to this vulnerability. CVE-2024-34102: A threat actor offered to sell a critical security vulnerability affecting Adobe Commerce and Magento, specifically versions 2.4.6 and earlier. FortiClient: A threat actor on BreachForums advertised exploits for vulnerabilities present in Fortinet’s FortiClient EMS 7.4/7.3 that result in SQL Injection and Remote Code Execution. The actor is selling the exploits for $30,000. Apple and Android Zero Day: A threat actor on BreachForums is advertising a 0-day exploit present in Apple’s iMessage and Android’s text messaging that the actor claims results in Remote Code Execution (RCE). The TA is selling the binary for the exploit for $800,000.

image for Hackers Exploit Ivan ...

 Firewall Daily

The Cybersecurity and Infrastructure Security Agency (CISA) has alerted organizations about an active exploitation of a vulnerability in Ivanti Endpoint Manager (EPM). This critical flaw, tracked as CVE-2024-29824, poses a serious threat, allowing attackers to remotely execute malicious code on affected servers   show more ...

without authentication.   The Ivanti vulnerability was subsequently patched by Ivanti in May. However, it appears that many organizations have yet to apply these essential updates, putting them at risk. CISA’s warning highlights the urgency of addressing this vulnerability, especially as it has been confirmed that hackers are actively exploiting unpatched systems.  Background on the Ivanti Vulnerability CVE-2024-29824  CISA's advisory mandates that all federal civilian agencies remediate this vulnerability by October 23, 2024. The flaw in the Ivanti Endpoint Manager is particularly concerning because it enables unauthenticated attackers to gain access to sensitive systems. CISA stated, “These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.” This emphasizes the need for immediate action from organizations relying on Ivanti's software solutions.  Ivanti, a prominent IT software company with a client base that includes much of the Fortune 100, has confirmed that this vulnerability is actively being used to target a “limited number” of its customers. While the company has not disclosed how many customers may have been compromised, it raises significant concerns about data security and potential data exfiltration.  Past Incidents and Ongoing Concerns  This isn't the first time Ivanti has faced scrutiny over vulnerabilities in its products. Earlier in the year, the company acknowledged the widespread exploitation of flaws in its Connect Secure VPN solution, which is used by thousands of corporations globally. These earlier vulnerabilities were reportedly linked to attacks by hackers supported by the Chinese government, who sought to infiltrate customer networks and extract sensitive information, reported TechCrunch.   Given this context, the newly identified Ivanti vulnerability, CVE-2024-29824, presents a worrying continuation of a trend. Organizations are urged to act swiftly to ensure their systems are secure and updated.  Recommended and Mitigations   To mitigate the CVE-2024-29824 vulnerability, it is crucial for organizations using Ivanti Endpoint Manager to implement the patch provided by Ivanti. This patch involves replacing five DLL files in the core server with updated versions included in the patch.   To complete the process, organizations must restart their core server or run the IISRESET command to ensure the new DLL files are properly loaded. Ivanti has indicated that changes have been made to the patch since its initial release. Therefore, users are strongly encouraged to consult the updated advisory and follow the necessary steps to mitigate risks associated with this vulnerability. 

image for Google Launches Enha ...

 Firewall Daily

Google has announced the launch of an enhanced fraud protection pilot in India targeting apps installed from Internet-sideloading sources. With global fraud and scams costing consumers over $1 trillion annually, India has emerged as a hotspot for cybercrime, resulting in substantial financial losses. According to the   show more ...

Indian Cyber Crime Coordination Centre (I4C), in the first four months of 2024 alone, Indian consumers reportedly lost over ₹1,750 crore (approximately $212 million USD) to cybercriminal activities. Cyber fraud is one of the most prevalent forms of cybercrime in India. To combat this escalating threat, Google has been proactive in enhancing the security features of its Android operating system. Google Play Protect, the built-in app security system for Android, scans a staggering 200 billion apps daily, ensuring that users remain protected from harmful applications. However, with the constantly changing cyber threats, innovation is key. To upgrade the current security systems, Google introduced real-time scanning for Google Play Protect last year, targeting malicious apps that may be sideloaded from various internet sources. This initiative has already identified over 10 million malicious apps globally, significantly enhancing the safety of Android users. Launching the Enhanced Fraud Protection Pilot Building on these previous efforts, Google is set to expand its Google Play Protect security capabilities by introducing enhanced fraud protection specifically designed for apps installed from Internet-sideloading sources. This includes applications downloaded via web browsers, messaging apps, and file managers. Having successfully launched this pilot in countries like Singapore, Thailand, and Brazil, Google is now bringing this initiative to India. The pilot has already shown promising outcomes, successfully blocking nearly 900,000 high-risk installations in Singapore alone. The enhanced fraud protection system will automatically analyze and block the installation of apps that request sensitive permissions frequently abused by fraudsters. These permissions include RECEIVE_SMS, READ_SMS, BIND_NOTIFICATIONS, and ACCESSIBILITY, which can be exploited to intercept one-time passwords (OTPs) via SMS or notifications, as well as to monitor screen content. How the Google Sideloading Protection System Works Once the pilot is initiated, if a user in India attempts to install an application from an Internet-sideloading source and any of the aforementioned sensitive permissions are declared, Google Play Protect will automatically block the installation. Users will receive a clear explanation for the block, enhancing their understanding of potential risks. This proactive measure is crucial, as Google’s analysis of major fraud malware families has shown that over 95 percent of such malicious app installations originate from Internet-sideloading sources. By intercepting these installations before they occur, Google aims to create a safer environment for users in India. For app developers whose applications might be affected by this pilot, it is vital to review the permissions that their apps request. Google advises developers to adhere to best practices in permission management and to consult resources that detail how to safeguard user data effectively. Developers can refer to updated guidance from Google on Play Protect warnings, which offers tips on addressing potential issues with their apps and instructions for filing an appeal if necessary. This collaboration between Google and developers is essential to ensure that user safety remains a top priority. A Collaborative Approach to Cybersecurity Creating a secure mobile experience is not just the responsibility of one entity; it requires collaborative efforts among various stakeholders. Google said it is committed to partnering with governments, industry leaders, and other organizations to bolster the safety of digital interactions for all users. Sugandh Saxena, CEO of the Fintech Association for Consumer Empowerment, expressed his support for the initiative: "Giving people safe platforms to access digital financial services rests on several pillars. Our work tells us that fraudsters are misusing open web links to distribute malicious apps to harm customers in various ways. Google's enhanced fraud protection pilot will be a vital toolkit to plug a critical gap in protecting customers from financial crimes. We believe this initiative will help combat such frauds, and we look forward to contributing to the program." Similarly, Manish Agrawal, Senior Executive Vice President & Head of Credit Intelligence & Control at HDFC Bank Limited, emphasized the importance of user vigilance: "Rapid digitization of financial transactions in India over the past few years has spelled convenience for millions of people. Google's new pilot, Google Play Protect Enhanced Fraud Protection, is another step towards user security and app protection. The new feature proposes to protect users against harmful apps and malware being downloaded onto their devices. In the ongoing fight against digital fraud, concerted efforts by all stakeholders are key to creating a safe digital banking environment for all."

image for Google Addresses Cri ...

 Firewall Daily

Google recently addressed a flaw within cellular modem vulnerabilities that can pose risk to smartphone users. The cellular baseband is responsible for handling all cellular communications, including LTE, 4G, and 5G connectivity. However, the complexity of this software presents challenges in security hardening,   show more ...

making it an attractive target for malicious actors.  The cellular baseband is crucial for maintaining a smartphone's connection to cellular networks, which involves processing external inputs from potentially untrusted sources. Attackers can exploit this connection by utilizing false base stations to inject malicious network packets. Certain protocols, such as IMS (IP Multimedia Subsystem), allow for remote execution of these attacks globally.  Understanding Cellular Modem Vulnerabilities  Like any software, the firmware within the cellular baseband is prone to bugs and errors. Such vulnerabilities in cellular modems pose a significant concern due to their exposure within a device's attack surface. Numerous security studies have demonstrated that these software bugs can be exploited to achieve remote code execution, thereby underscoring the critical risks associated with these vulnerabilities.  The field of baseband security has gained traction, with many security conferences highlighting the exploitation of software bugs in this area. These events often include training sessions on techniques for emulating, analyzing, and exploiting baseband firmware. Alarmingly, reports indicate that most cellular basebands lack the exploit mitigations commonly found in other software domains, such as mature hardening techniques that are standard in the Android operating system.  These cellular modem vulnerabilities are not just theoretical. Exploit vendors and cyber-espionage firms have been known to misuse these vulnerabilities to invade personal privacy. For example, zero-day exploits in cellular basebands have facilitated the deployment of malware like Predator. Additionally, some exploit marketplaces list baseband vulnerabilities, suggesting that these issues are more prevalent than many realize. Attackers can leverage these vulnerabilities to gain unauthorized access, execute arbitrary code, or extract sensitive information.  Recognizing these troubling trends, both Android and Pixel have enhanced their Vulnerability Rewards Program, focusing more on identifying and mitigating exploitable bugs in connectivity firmware.  Building a Fortress: Proactive Defenses in Pixel Modems  In response to the increasing threats posed by baseband security attacks, Pixel has integrated numerous proactive defenses over the years. The latest Pixel 9 models, including the Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, and Pixel 9 Pro Fold, showcase these advanced features:  Bounds Sanitizer: This tool prevents buffer overflows—an issue where excessive data can overwrite memory—by automatically adding checks around specific memory accesses. This ensures that the code does not access memory outside designated areas, reducing the risk of memory corruption.  Integer Overflow Sanitizer: This feature guards against overflows in numerical calculations that could lead to unintended behaviors, thereby preventing exploitation by malicious actors.  Stack Canaries: These act as tripwires within the code, ensuring that execution follows the expected path. If an attacker attempts to manipulate this flow, the canary triggers an alert, signaling a potential attack.  Control Flow Integrity (CFI): CFI further enhances security by constraining code execution to a limited set of paths. Should an attacker try to deviate from these paths, the modem will restart, preventing unauthorized actions.  Auto-Initialize Stack Variables: Pixel phones automatically initialize stack variables to zero, thwarting potential leaks of sensitive data or exploitation through uninitialized values.  In addition to these features, Pixel employs various bug detection tools, such as address sanitizers, during the testing process. This proactive approach enables the identification and patching of software bugs before devices reach consumers.  The Pixel Advantage: Combining Protections for Maximum Security  While security hardening is inherently challenging and requires ongoing effort, the combination of these protective measures significantly enhances the resilience of Pixel 9 against baseband attacks. Pixel’s commitment to securing its users is evident throughout the entire software stack, showcasing how the company continuously adapts to stay ahead of emerging threats. The proactive measures taken by Pixel highlight the importance of addressing Pixel phone vulnerabilities in mobile security. By investing in comprehensive security hardening techniques, Pixel aims to ensure that its users are protected from the rising tide of cyber threats. 

image for Cybersecurity Stress ...

 Firewall Daily

A recent survey conducted by ISACA has highlighted the growing stress levels faced by cybersecurity professionals in Australia. According to the report, 64% of respondents indicated that their roles have become more stressful over the past five years. This sentiment is slightly above the global average.   The survey,   show more ...

which garnered insights from over 1,800 cybersecurity experts worldwide, was backed by Adobe and highlighted various factors contributing to this heightened stress. A staggering 85% of Australian professionals cited the increasingly complex threat environment as the primary stressor.    Additionally, 48% pointed to inadequate budgets, while 50% identified issues related to hiring and retention as significant contributors to their stress levels. Notably, 35% of Australian respondents mentioned a lack of focus on prioritizing cybersecurity risks, marginally higher than the global average of 34%.    High Levels of Stress Among Australian Cybersecurity Professionals  While the report highlights the challenges faced in the field, it also reveals a concerning trend regarding training. Globally, 45% of cybersecurity professionals reported issues with insufficiently trained staff. However, in Australia, this figure was somewhat lower, with 37% acknowledging this challenge. Despite this relatively better statistic, the skills gap remains a pressing concern for the industry.   Cyberattacks continue to plague organizations, and Australian cybersecurity professionals are acutely aware of the threat. The survey indicated that 29% of Australian organizations reported an uptick in attacks, which is slightly less than the global average of 38%. Among the types of attacks, social engineering and third-party breaches were the most frequently cited, each noted by 19% of respondents. Other significant concerns included security misconfigurations and the exposure of sensitive data.    Perhaps most interestingly, 53% of Australian professionals expect to encounter a cyberattack in the next year, surpassing the global average of 47%. However, confidence in their organizations' ability to effectively detect and respond to such threats is low, with only 32% expressing a high degree of assurance. Compounding this issue, 57% of respondents were unaware of their organization's cyber insurance status.   Jo Stewart-Rattray, ISACA's Oceania Ambassador, offered a nuanced perspective on the situation. While she acknowledged a decrease in reported cybersecurity incidents in Australia, she emphasized the need for continued vigilance. Despite a lower number of respondents reporting cyber-attacks in Australia than in other parts of the world, we know that each attack is increasing in complexity, requiring even more effort, energy, and intelligence from cybersecurity professionals," she stated.  Budget and Staffing Issues   The report also drew attention to pressing budget and staffing issues within organizations. Approximately 47% of respondents reported that their cybersecurity budgets are underfunded, with only a third expecting an increase in the coming year. In terms of personnel, 51% of organizations indicated that their teams are understaffed. However, the pace of hiring appears to have slowed, with 44% of organizations reporting no open positions.   In examining trends related to skills and retention, the survey revealed that employers are increasingly prioritizing candidates with hands-on experience and relevant credentials. A significant skills gap was identified in areas such as communication, critical thinking, and cloud computing. High-stress levels, insufficient financial incentives, and competitive recruitment from other companies were identified as primary factors hindering the retention of qualified candidates.   Jon Brandt from ISACA offered insight into how organizations can better support their cybersecurity staff. He suggested that employers need to focus on managing the occupational stress experienced by their cybersecurity professionals. "Employees want to feel valued. As the leadership adage goes, take care of your people and they'll take care of you," Brandt emphasized.   Mike Mellor from Adobe echoed these sentiments, drawing attention to the rising threat of social engineering attacks. He stressed the importance of securing authentication methods as a critical measure in fortifying organizational defenses. Fostering a security culture combined with strong technical controls is essential for safeguarding organizations against such threats," Mellor noted. 

image for Transatlantic Cable  ...

 News

Episode 365 kicks off with discussion around Donald Trumps recent courting of the crypto world. From there talk moves to Mozillas recent decision to enable Privacy Preserving Attribution (PPA) by default – and thats got some in the EU worried. To wrap up the team discuss two stories related to A.I – first around   show more ...

Microsoft suggesting that omnipresent AI companions will soon be a thing, and second how AI is now capable of completing CAPTCHA quicker, and more efficiently than any human.  How the tables have turned. If you like what you heard, please consider subscribing. Crypto world hoping for Trump election win Mozilla Faces GDPR Complaint Over New Firefox Tracking Feature Microsoft: ever present AI assistants are coming AI just made a mockery of CAPTCHA and thats bad news for real people

 Feed

Ubuntu Security Notice 7054-1 - It was discovered that unzip did not properly handle unicode strings under certain circumstances. If a user were tricked into opening a specially crafted zip file, an attacker could possibly use this issue to cause unzip to crash, resulting in a denial of service, or possibly execute arbitrary code.

 Feed

There appears to be some (possibly deprecated) code associated with AF_QIPCRTR sockets in bpf_service.c. Within this file are some ioctl handlers - e.g. qrtr_bpf_filter_attach and qrtr_bpf_filter_detach. In the case of qrtr_bpf_filter_detach, the global pointer bpf_filter is fetched and freed while only holding a   show more ...

socket lock (and an irrelevant rcu_read_lock) - this may lead directly to double frees or use-after-free (kernel memory corruption) if a malicious user is able to call the QRTR_DETTACH_BPF ioctl on multiple AF_QIPCRTR sockets at once. Based on Android SELinux files, it appears this may be possible from some lower-privileged vendor and HAL services.

 Feed

Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task of managing security threats into five distinct stages: Scoping, Discovery, Prioritization, Validation, and Mobilization. Each of these stages plays a crucial role in identifying, addressing, and mitigating vulnerabilities -

 Feed

Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted 65 seconds. The web infrastructure and security company said it fended off "over one hundred hyper-volumetric L3/4 DDoS attacks throughout the month, with many exceeding 2 billion packets per second (Bpps) and 3 terabits per second (

 Feed

A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable malicious actors to execute arbitrary JavaScript code under certain conditions. The flaw, tracked as CVE-2024-47374 (CVSS score: 7.2), has been described as a stored cross-site scripting (XSS) vulnerability impacting all versions of the plugin up to and including 6.5.0.2. It was

 Feed

Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure of 107 internet domains used by state-sponsored threat actors with ties to Russia to facilitate computer fraud and abuse in the country. "The Russian government ran this scheme to steal Americans' sensitive information, using seemingly legitimate email accounts to trick victims into revealing account credentials

 Threat Lab

Unfortunately, when your devices are infected with a virus, it’s not as easy as a little bed rest for them to recover, and the damage can be long-lasting. A cyberattack can compromise your computers, phones and tablets, and open the door for cyber thieves to steal your sensitive personal information. According to a   show more ...

study by the University of Maryland’s A. James Clark School of Engineering, there is a cyberattack approximately every 39 seconds. The most common form of cyberattack is malware, a type of software that’s used to break into your computer system. Last year alone, there were more than 6 billion malware attacks detected worldwide. Some of the many forms of malware include: Ransomware: Prevents you from accessing your files, devices or network unless you pay money. Spyware: Secretly monitors your online behavior and shares your personal information. Keylogger: Records your keystrokes as you type, then sends sensitive information like passwords and credit card numbers to hackers. Trojan: Disguises itself as legitimate files to monitor your online activity and steal sensitive data. Computer virus: Infects files and hard drives and spreads from device to device, damaging and destroying data and software. Adware: Installs itself on your device and displays unwanted online advertisements and pop-ups. Cryptojacking: Hides on your device and steals its computing resources to mine cryptocurrencies like Bitcoin. Malware can affect any device with computing capability and it’s commonly spread through email attachments. If malware goes undetected, your devices can become locked or unstable. Here are some telltale signs that your phone, tablet or computer may have been infected with malware: Sudden slowdowns, repeated crashes or error messages that won’t shut down or restart Will not let you remove software Frequent pop-ups, inappropriate ads or ads that interfere with page content New toolbars or icons in your browser or on your desktop New default search engine New tabs or websites you didn’t open Sends emails you didn’t write Runs out of battery more quickly than it should Ransomware is one of the most common forms of malware, and the costliest. Cyber Security Ventures predicts by 2031 a new ransomware attack will occur every 2 seconds, costing its victims nearly $265 billion.  These attacks are aimed at consumers, small businesses and enterprises.  Last year, there were a record number of ransomware attacks impacting consumer data at high-profile organizations such as Bank of America, Rite Aid, and MGM Resorts. So how do we protect ourselves from this type of cybercrime? Here are a few tips for protecting your devices and information from malware attacks: Update your devices regularly to get the latest security patches. Most updates are easy to install and can be setup to update automatically. Use antivirus software like Webroot Premium to protect all your devices. Don’t visit suspicious websites, just block them! Don’t click on web pop-ups and consider using a pop-up blocker. Webroot’s Web Threat Shield detects and blocks malicious websites before you visit them. Don’t open emails, attachments, and click links unless they’re from email addresses you trust. Don’t download software unless it is from a website you know and trust. Use multi-factor authentication. Using more than one form of authentication to access your accounts, make it more difficult for malicious actors to gain access. Backup your devices regularly using solutions like Carbonite. It may not be possible for you to avoid catching a cold now and then, but it is possible to keep your devices safe from threatening viruses. By staying vigilant, you can keep your private information out of the hands of online criminals. Because when it comes to your cyber health, an ounce of prevention really is worth a pound of cure. For more information and solutions: Federal Trade Commission How to Recognize, Remove, and Avoid Malware 7 cyber safety tips to outsmart scammers Uncover the nastiest malware of 2023 Cyber threats in gaming–and 3 tips for staying safe Webroot Premium, all-in-one device, privacy, and identity protection Carbonite, continuous and unlimited cloud backup The post 8 Tips to protect your devices from malware attacks appeared first on Webroot Blog.

2024-10
Aggregator history
Friday, October 04
TUE
WED
THU
FRI
SAT
SUN
MON
OctoberNovemberDecember