Menu

Blog

Page 910

Apr 4, 2024

Microsoft still unsure how hackers stole MSA key in 2023 Exchange attack

Posted by in category: cybercrime/malcode

The U.S. Department of Homeland Security’s Cyber Safety Review Board (CSRB) has released a scathing report on how Microsoft handled its 2023 Exchange Online attack, warning that the company needs to do better at securing data and be more truthful about how threat actors stole an Azure signing key.

Microsoft believes that last May’s Exchange Online hack is linked to a threat actor known as ‘Storm-0558’ stealing an Azure signing key from an engineer’s laptop that was previously compromised by the hackers at an acquired company.

Storm-0558 is a cyberespionage actor affiliated with China that has been active for more than two decades targeting a wide range of organizations.

Apr 4, 2024

Critical flaw in LayerSlider WordPress plugin impacts 1 million sites

Posted by in category: cybercrime/malcode

A premium WordPress plugin named LayerSlider, used in over one million sites, is vulnerable to unauthenticated SQL injection, requiring admins to prioritize applying security updates for the plugin.

LayerSlider is a versatile tool for creating responsive sliders, image galleries, and animations on WordPress sites, allowing users to build visually appealing elements with dynamic content on online platforms.

Researcher AmrAwad discovered the critical (CVSS score: 9.8) flaw, tracked as CVE-2024–2879, on March 25, 2024, and reported it to WordPress security firm Wordfence via its bug bounty program. For his responsible reporting, AmrAwad received a bounty of $5,500.

Apr 4, 2024

Google fixes one more Chrome zero-day exploited at Pwn2Own

Posted by in category: cybercrime/malcode

Google has fixed another zero-day vulnerability in the Chrome browser, which was exploited by security researchers during the Pwn2Own hacking contest last month.

Tracked as CVE-2024–3159, this high-severity security flaw is caused by an out-of-bounds read weakness in the Chrome V8 JavaScript engine.

Remote attackers can exploit the vulnerability using crafted HTML pages to gain access to data beyond the memory buffer via heap corruption, which can provide them with sensitive information or trigger a crash.

Apr 4, 2024

Microsoft fixes Outlook security alerts bug caused by December updates

Posted by in category: security

Microsoft has fixed an issue that triggers erroneous Outlook security alerts when opening. ICS calendar files after installing the December 2023 Outlook Desktop security updates.

The December Patch Tuesday security updates behind these inaccurate warnings patch the CVE-2023–35636 Microsoft Outlook information disclosure vulnerability, which attackers can exploit to steal NTLM hashes via maliciously crafted files.

These credentials are used to authenticate as the compromised Windows user in pass-the-hash attacks, to gain access to sensitive data or spread laterally on their network.

Apr 4, 2024

Users say Google’s VPN app “breaks” the Windows DNS settings

Posted by in category: futurism

Does Google’s app really need to constantly reset all Windows network interfaces?

Apr 4, 2024

Intel, Microsoft discuss plans to run Copilot locally on PCs instead of in the cloud

Posted by in category: robotics/AI

Companies are trying to make the “AI PC” happen with new silicon and software.

Apr 4, 2024

Pentagon calls for tighter integration between military and commercial space

Posted by in categories: military, space travel

I would have never written the requirements for Starship.

Apr 4, 2024

How to Check if a Linux Distribution is Compromised by the XZ Utils Backdoor in 6 Steps

Posted by in category: cybercrime/malcode

Data security — information security newspaper | hacking news.

Apr 4, 2024

What we know about the xz Utils backdoor that almost infected the world

Posted by in category: futurism

Malicious updates made to a ubiquitous tool were a few weeks away from going mainstream.

Apr 4, 2024

New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks

Posted by in category: security

New research exposes vulnerability in HTTP/2 protocol! The CONTINUATION frame can be exploited for DoS attacks, warns security expert Bartek Nowotarsk.

Page 910 of 11,841First907908909910911912913914Last