"Splunk Patches Vulnerabilities in Enterprise Product"

"Splunk Patches Vulnerabilities in Enterprise Product"

Splunk recently announced security patches for its Enterprise product, including vulnerabilities that have been assigned a high severity rating.  One of the flaws, CVE-2024-29946, impacts the Dashboard Examples Hub in the Splunk Dashboard Studio app and can be exploited to bypass protections for risky Search Processing Language (SPL) commands. Splunk noted that this could let attackers bypass SPL safeguards for risky commands with the permissions of a highly privileged user in the Hub.

Submitted by Adam Ekwall on

"Malware Upload Attack Hits PyPI Repository"

"Malware Upload Attack Hits PyPI Repository"

To mitigate a malware upload campaign, the Python Package Index (PyPI) repository's maintainers suspended user registration and the creation of new projects. Checkmarx warns that multiple malicious Python packages are being distributed using typosquatting methods. According to researchers, this is a multi-stage attack with a malicious payload aimed at stealing cryptocurrency wallets, sensitive data from browsers, and more. Researchers have also reported that the malicious payload uses a persistence mechanism to survive reboots.

Submitted by grigby1 CPVI on

"Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries"

"Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries"

A Linux version of "DinodasRAT," a multi-platform backdoor, has been discovered in the wild, with targets including China, Taiwan, Turkey, and Uzbekistan. DinodasRAT, also known as "XDealer," is a malware written in C++ that can gather sensitive information from compromised hosts. In October 2023, a government entity in Guyana was targeted as part of "Operation Jacana," a cyber espionage campaign aimed at deploying the Windows version of the implant.

Submitted by grigby1 CPVI on

"Cisco Warns of Password-Spraying Attacks Targeting VPN Services"

"Cisco Warns of Password-Spraying Attacks Targeting VPN Services"

Cisco has released a set of recommendations to help customers mitigate password-spraying attacks on Remote Access VPN (RAVPN) services running on Cisco Secure Firewall devices. The company revealed that the attacks have also targeted other remote access VPN services and appear to be part of a reconnaissance operation. In a password-spraying attack, an adversary tries the same password on multiple accounts to log in.

Submitted by grigby1 CPVI on

"AI Weaponization Becomes a Hot Topic on Underground Forums"

"AI Weaponization Becomes a Hot Topic on Underground Forums"

According to ReliaQuest, most cyberattacks against organizations are executed through employee social engineering, and criminals are using Artificial Intelligence (AI), to improve their techniques. The use of AI to accelerate attacks has become a hot topic in major cybercrime forums, with a growing interest in weaponizing the technology.

Submitted by grigby1 CPVI on

"Apple ID 'Push Bombing' Scam Campaign Hits Cyber Startup Founders"

"Apple ID 'Push Bombing' Scam Campaign Hits Cyber Startup Founders"

An Apple ID spearphishing campaign involving push bombing and caller ID spoofing recently targeted several technology professionals, including startup founders and cybersecurity professionals. Parth Patel, a software engineer and co-founder of a stealth technology startup, said that he and other startup founders in his circle had been targeted. Patel reported receiving a flurry of push notifications on all of his Apple devices, all requesting permission to reset his Apple ID password.

Submitted by grigby1 CPVI on

"NIST Unveils New Consortium to Operate its National Vulnerability Database"

"NIST Unveils New Consortium to Operate its National Vulnerability Database"

The US National Vulnerability Database (NVD) program manager, Tanya Brewer, has officially announced that the National Institute of Standards and Technology (NIST) will delegate some management responsibilities for the world's most popular software vulnerability repository to an industry consortium. NIST established the US NVD in 2005 and has continued to operate it since then. The NVD Consortium will help NIST with funding and feedback for future developments.

Submitted by grigby1 CPVI on

"Cisco Patches DoS Vulnerabilities in Networking Products"

"Cisco Patches DoS Vulnerabilities in Networking Products"

Cisco recently announced patches for multiple IOS and IOS XE software vulnerabilities that could be exploited without authentication to cause a denial-of-service (DoS) condition.  The most severe of the flaws, with a CVSS score of 8.6, impact the Locator ID Separation Protocol (LISP), IPv4 Software-Defined Access (SD-Access) fabric edge node, Internet Key Exchange version 1 (IKEv1) fragmentation, and DHCP snooping features of IOS and IOS XE software, and the IP packet processing of AP software.

Submitted by Adam Ekwall on

"17 Billion Personal Records Exposed in Data Breaches in 2023"

"17 Billion Personal Records Exposed in Data Breaches in 2023"

According to security researchers at Flashpoint, reported data breach incidents rose by 34.5% in 2023, with over 17 billion personal records compromised throughout the year.  The researchers recorded 6077 publicly reported data breaches last year, which included sensitive information such as names, social security numbers, and financial data.  Over 70% of these incidents resulted from unauthorized access that stemmed from outside the affected organization.

Submitted by Adam Ekwall on

"'SAFE'" Technology Protects Data From Theft and Accidental Distribution"

"'SAFE'" Technology Protects Data From Theft and Accidental Distribution"

Researchers at Los Alamos National Laboratory developed a new technology to improve data security in various areas. The Secure, Automatic, Failsafe Eraser (SAFE) technology can erase the memory of devices and prevent data disclosures. According to Bertrand Dushime, a member of the Lab's Space Electronics and Signal Processing group and a SAFE project collaborator, the goal is to modernize dismantlement verification instruments and improve the information barrier. This technology will enable better analysis, more specific parameter verification, higher-quality treaty verification, and more.

Submitted by grigby1 CPVI on
Subscribe to