Author: Admin

September 19, 2024Ravi LakshmananEnterprise Security / DevOps GitLab has it released patches to address a critical flaw affecting Community Edition (CE) and Enterprise Edition (EE) that could lead to authentication bypass. The vulnerability resides in the ruby-saml library (CVE-2024-45409, CVSS Score: 10.0), which could allow an attacker to log in as an arbitrary user on a vulnerable system. This was resolved last week. The issue is caused by the library not validating the signature of the SAML response correctly. SAML, short for Security Assertion Markup Language, is a protocol that enables single sign-on (SSO) and the exchange of authentication and…

Read More

Cybersecurity researchers have discovered a never-before-seen botnet consisting of an army of small office/home office (SOHO) and IoT devices likely operated by a Chinese state-owned threat actor called Linen typhoon (aka Ethereal Panda or RedJuliett). Sophisticated botnet, duplicated Raptor train Lumen’s Black Lotus Labs is believed to have been active since at least May 2020, peaking at 60,000 actively jailbroken devices in June 2023. “Since then, there have been over 200,000 SOHO routers, NVR/DVR devices, network attached storage (NAS) servers and IP cameras; all of which are included in the Raptor Train botnet, making it one of China’s largest state-funded…

Read More

He was a Chinese citizen accused in the US on charges of conducting a “multi-year” phishing campaign to gain unauthorized access to computer software and source code created by the National Aeronautics and Space Administration (NASA), research universities and private companies. Song Woo, 39, was charged with 14 counts of wire fraud and 14 counts of aggravated identity theft. If convicted, he faces a maximum sentence of 20 years in prison on each count of fraud and two consecutive years in prison on the identity theft count. He worked as an engineer at the Aviation Industry Corporation of China (AVIC),…

Read More

The evolution of software always catches us by surprise. I remember betting against the IBM Deep Blue computer during its chess match against Grandmaster Garry Kasparov in 1997, only to be stunned when the machine declared victory. Let’s move to today. Could we have imagined just three years ago that a chatbot could write essays, handle support calls and even create commercials Source link

Read More

September 18, 2024Ravi LakshmananCyber ​​espionage / malware A cyber espionage group linked to North Korea has been seen using leverage phishing lures for jobs to target potential victims in the energy and aerospace verticals and infect them with a previously undocumented backdoor called MISPPEN. The activity cluster is tracked by Mandiant, owned by Google, under a pseudonym UNC2970which he said coincides with a threat group known as TEMP. Hermitwhich is also commonly referred to as the Lazarus Group or Diamond Sleet (formerly Zinc). The threat actor has a history of attacking government, defense, telecommunications and financial institutions around the world…

Read More

September 18, 2024Ravi LakshmananBrowser security/privacy Google has announced that it is releasing a new set of features for its Chrome browser that gives users more control over their data while surfing the web and protects against online threats. “With the latest version of Chrome, you can take advantage of our upgraded security checks, opt out of unwanted website notifications more easily, and grant certain site permissions just once,” the tech giant said. said. Improvements to Security check allow it to run automatically in the background, notifying users of actions they’ve taken, such as revoking permissions for websites they no longer…

Read More

September 18, 2024Ravi LakshmananMobile Security / Encryption The GSM Association, the governing body that oversees the development of the Rich Communications Services (RCS) protocol, said on Tuesday it is working to implement end-to-end encryption (E2EE) to secure messages sent between the Android and iOS ecosystems. “The next important milestone is the addition of a universal RCS profile to important user protections such as compatible end-to-end encryption,” Tom Van Pelt, CTO, GSMA said. “This will be the first deployment of a standardized, interoperable message encryption between different computing platforms that solves significant technical challenges such as key federation and group membership…

Read More

September 18, 2024Ravi LakshmananVirtualization / Network Security Broadcom on Tuesday released updates to address a critical security flaw affecting VMware vCenter Server that could open the way for remote code execution. The vulnerability tracked as CVE-2024-38812 (CVSS score: 9.8) was described as a heap overflow vulnerability in DCE/RPC protocol. “An attacker with network access to vCenter Server could cause this vulnerability by sending a specially crafted network packet that could potentially lead to remote code execution,” the virtualization service provider. said in the bulletin. The flaw is similar to two other remote code execution flaws, CVE-2024-37079 and CVE-2024-37080 (CVSS scores:…

Read More

September 17, 2024Ravi LakshmananArtificial intelligence / regulatory compliance Meta has announced that it will begin training its artificial intelligence (AI) systems in the coming months using publicly available content shared by adult users on Facebook and Instagram in the UK. “This means that our generative AI models will reflect British culture, history and idioms, and that UK companies and institutions will be able to use the latest technology,” the social media giant said. said. As part of the process, users aged 18 and over are expected to receive in-app notifications starting this week on both Facebook and Instagram explaining how…

Read More

September 17, 2024Ravi LakshmananSpyware / Privacy The US Treasury Department has imposed new sanctions against five executives and one entity associated with the Intellexa consortium for their role in the development, operation and distribution of commercial spyware called Predator. “The United States will not tolerate the mindless proliferation of disruptive technologies that threaten our national security and undermine the privacy and civil liberties of our citizens,” said Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence Bradley T. Smith. “We will continue to prosecute those who seek to promote the spread of exploitative technologies, while encouraging the responsible…

Read More