Yesterday, a researcher disclosed a method of hiding up to three MB of data inside a Twitter image.
In his demonstration, the researcher showed both MP3 audio files and ZIP archives contained within the PNG images hosted on Twitter.
Although the art of hiding non-image data in images (steganography) isn’t novel, the fact that the images can be hosted on a popular website like Twitter and are not sanitized opens up a possibility for their abuse by malicious actors. Read more »
Η έξαρση της COVID-19 και το αποκεντρωμένο εργατικό δυναμικό που προέκυψε, έχουν εισάγει νέες, περίπλοκες προκλήσεις στις επιχειρήσεις, με 45% των υπεύθυνων λήψης αποφάσεων να αναφέρουν αυξημένη πίεση από τα διοικητικά τους συμβούλια σε σχέση με την ασφάλεια του οργανισμού τους.
Read more »
VMware has addressed a high severity unauthenticated RCE vulnerability in VMware View Planner, allowing attackers to abuse servers running unpatched software for remote code execution.
View Planner is a free tool for benchmarking desktop client and server-side performance in Virtual Desktop Infrastructure environments.
The vulnerability was discovered and reported to VMware by Positive Technologies web application security expert Mikhail Klyuchnikov. Read more »
Following Microsoft’s release of out-of-band patches to address multiple zero-day flaws in on-premises versions of Microsoft Exchange Server, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive warning of “active exploitation” of the vulnerabilities.
The alert comes on the heels of Microsoft’s disclosure that China-based hackers were exploiting unknown software bugs in Exchange server to steal sensitive data from select targets, marking the second time in four months that the U.S. has scrambled to address a widespread hacking campaign believed to be the work of foreign threat actors.
Read more »
Microsoft has released an updated script that scans Exchange log files for indicators of compromise (IOCs) associated with the vulnerabilities disclosed on March 2, 2021.
National CSIRT-CY is aware of widespread domestic and international exploitation of these vulnerabilities and strongly recommends organizations run the Test-ProxyLogon.ps1 script as soon as possible to help determine whether their systems are compromised.
For additional information on the script, see Microsoft’s blog HAFNIUM targeting Exchange Servers with 0-day exploits
. Read more »