Mr.Trunk · @mrtrunk
13 followers · 20999 posts · Server dromedary.seedoubleyou.me

SecurityOnline: CVE-2023-4863: New Chrome 0-day Bug Under Active Attacks securityonline.info/cve-2023-4 -2023-4863

#vulnerability #cve #chrome #0day

Last updated 2 years ago

Mr.Trunk · @mrtrunk
12 followers · 20754 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
12 followers · 20654 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
12 followers · 20559 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
12 followers · 20452 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
12 followers · 20347 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
12 followers · 20243 posts · Server dromedary.seedoubleyou.me
sekurak News · @sekurakbot
50 followers · 248 posts · Server mastodon.com.pl

BLASTPASS – czyli aktywny exploit wykorzystywany przez Pegasusa. Do infekcji nie potrzebna jest interakcja ofiary.

Citizen Lab dostarcza właśnie kilka szczegółów dotyczących działania exploitu, którego udało się namierzyć w wyniku przechwycenia realnych ataków na iPhone-y. Okazuje się że do ofiary wystarczy wysłać za pośrednictwem iMessage załączniki, zawierające odpowiednio spreparowane obrazki. Dalej już wszystko dzieje się automatycznie – telefon procesuje obrazki, a samo procesowanie powoduje wykonanie...

sekurak.pl/blastpass-czyli-akt

#wbiegu #0day #iphone #pegasus

Last updated 2 years ago

Mr.Trunk · @mrtrunk
12 followers · 20141 posts · Server dromedary.seedoubleyou.me
sekurak News · @sekurakbot
50 followers · 249 posts · Server mastodon.com.pl

Apple łata dwa 0daye wykorzystywane w atakach na iPhone-y. Złośliwym obrazkiem można przejąć telefon

Nowa wersja iOS 16.6.1 przynosi łatki zaledwie dwóch błędów, z czego jeden wygląda dość groźnie – odpowiednio spreparowanym obrazkiem można wykonać dowolny kod na telefonie ofiary: Impact: Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been...

sekurak.pl/apple-lata-dwa-0day

#wbiegu #0day #iphone #rce

Last updated 2 years ago

Chris Partridge · @tweedge
1011 followers · 941 posts · Server cybersecurity.theater

Find of the day - someone dropped an AtlasVPN on Reddit. The AtlasVPN daemon on Linux runs an HTTP server to accept CLI commands, it binds to 127.0.0.1:8076 by default.

What's hilarious is that it accepts commands without ANY authentication - so if you open a malicious webpage, that webpage can fire a POST to 127.0.0.1:8076/connection/stop and instantly disconnect your VPN.

Utter garbage.

Source: reddit.com/r/cybersecurity/com

Proof below - used AtlasVPN's latest Linux client, version 1.0.3.

#0day

Last updated 2 years ago

sekurak News · @sekurakbot
44 followers · 238 posts · Server mastodon.com.pl

0day w WinRAR był exploitowany od kilku miesięcy – m.in. za pomocą odpowiednio spreparowanego pliku zip

Informacja o podatności CVE-2023-38831 gruchnęła już dobrych kilka dni temu. Luka (luki) jest obecnie załatana, ale pokazały się informację o aktywnej tej eksploitacji podatności jako 0day – i to od kwietnia 2023. Na celowniku były m.in. komputery / konta osób handlujących kryptowalutami. Cały trick polegał na stworzeniu archiwum (np. zip),...

sekurak.pl/0day-w-winrar-byl-e

#wbiegu #0day #exploit #winrar

Last updated 2 years ago

STRÖMBLAD · @nopatience
1431 followers · 655 posts · Server swecyb.com

Guess we're just on fire right now. Critical authentication bypass in SSH VMware Aria Operations.

vmware.com/security/advisories

Quick estimations, roughly 4500 publicly available SSH-hosts running VMware Aria.

Will the next cl0p campaign please stand up?

#vmware #0day #ssh #vulnerability #ffs

Last updated 2 years ago

XenoLurch🏴 · @XenoLurch
40 followers · 533 posts · Server kolektiva.social

WinRAR 0-day that uses poisoned JPG and TXT files
weaponized to rob yuppies since April.

via arstechnica.com:

“A newly discovered zero-day in the widely used WinRAR file-compression program has been exploited for four months by unknown attackers who are using it to install malware when targets open booby-trapped JPGs and other innocuous inside file archives.

The vulnerability, residing in the way WinRAR processes the ZIP file format, has been under active exploit since April in securities trading forums, researchers from security firm Group IB reported Wednesday. The attackers have been using the vulnerability to remotely execute code that installs malware from families, including DarkMe, GuLoader, and Remcos RAT.

From there, the “criminals” withdraw money from broker accounts. The total amount of financial losses and total number of victims infected is unknown, although Group-IB said it has tracked at least 130 individuals known to have been compromised. WinRAR developers fixed the vulnerability, tracked as CVE-2023-38831, earlier this month.“

arstechnica.com/security/2023/

#punchup #yuppies #0day #hackers #winrar

Last updated 2 years ago

Emory L. · @emory
213 followers · 2067 posts · Server soc.kvet.ch

wow:
> "If any zero-day exploit can constitute 'negligence' for failure to catch and then patch, then every software company in the world has exposure," Walke says. "If, however, negligence requires notice of the zero-day exploit and then failure to act, that narrows the pool of potentially liable companies to only those who had notice of the flaw and ignored it."

#0day #liability #lawsuit

Last updated 2 years ago

Kristian Purrucker · @kristian
21 followers · 309 posts · Server social.purrucker.de

Erst mehrere Rapid Security Responses und wenige Tage später ein großes Sicherheitsupdate hinterher. Bei und von ist ja gerade einiges los …
Sollte man wohl schnell mal einspielen die Updates. Gibt schon exploits.

heise.de/news/Luecken-gestopft

#ios #macos #apple #0day

Last updated 2 years ago

MemoryLeech · @CyberLeech
102 followers · 974 posts · Server cyberplace.social

@glennpegden

@cyb3rops "Finally! Someone put the two IP IOCs related to the Netscaler ADC vuln CVE-2023-3519 in a Virustotal Graph, which allows me to share them

216[.]41[.]162[.]172
216[.]51[.]171[.]17"

virustotal.com/graph/g6a29f00a

#citrix #cirtix #cve20233519 #intel #zeroday #0day #cyber #cybersecurity

Last updated 2 years ago

MemoryLeech · @CyberLeech
102 followers · 974 posts · Server cyberplace.social
PrivacyDigest · @PrivacyDigest
441 followers · 1780 posts · Server mas.to

Exploited 0-days, an incomplete fix, and a botched disclosure: reigns

arstechnica.com/?p=1954819

#security #exploit #0day #snafu #infosec

Last updated 2 years ago

ITSEC News · @itsecbot
1390 followers · 36154 posts · Server schleuss.online

Microsoft hit by Storm season – a tale of two semi-zero days - The first compromise didn't get the crooks as far as they wanted, so they found a second ... nakedsecurity.sophos.com/2023/

#0day #storm #dataloss #microsoft #cryptography #vulnerability #authentication

Last updated 2 years ago