Ειδοποιήσεις

Threat actors are targeting Amazon, Zillow, Lyft, and Slack NodeJS apps using a new ‘Dependency Confusion’ vulnerability to steal Linux/Unix password files and open reverse shells back to the attackers.

Last month, BleepingComputer reported that security researcher Alex Birsan earned bug bounties from 35 companies by utilizing a new flaw in open-source development tools.

This flaw works by attackers creating packages utilizing the same names as a company’s internal repositories or components. When hosted on public repositories, including npm, PyPI, and RubyGems, dependency managers would use the packages on the public repo rather than the company’s internal packages when building the application.

This “dependency confusion” would allow an attacker to inject their own malicious code into an internal application in a supply-chain attack.

Read more »

Οι εργαζόμενοι που δουλεύουν από το σπίτι σε υπολογιστές που παρέχονται από τις εταιρείες τους επιδεικνύουν έλλειψη γνώσης σε θέματα κυβερνοασφάλειας μέσα από συμπεριφορές υψηλού ρίσκου.

Read more »

Όπως διαφάνηκε από μία πρόσφατη επίθεση υψηλού προφίλ, οι επιτιθέμενοι ολοένα και περισσότερο προσπαθούν να εκμεταλλευτούν αδυναμίες που τους επιτρέπουν την διασπορά κακόβουλου λογισμικού στους τελικούς χρήστες, την μη-εξουσιοδοτημένη πρόσβαση σε περιβάλλοντα ανάπτυξης ή τα δεδομένα τους, ή την ολική παραβίαση του στοχευμένου περιβάλλοντος.

Read more »

Cisco has addressed a maximum severity authentication bypass vulnerability found in the API endpoint of the Cisco ACI Multi-Site Orchestrator (MSO) installed on the Application Services Engine.

Cisco ACI MSO is an intersite network and policy orchestration solution that helps admins monitor the health of their organizations’ interconnected sites across multiple data centers. Read more »

Chinese state hackers cloned and started using an NSA zero-day exploit almost three years before the Shadow Brokers hacker group publicly leaked it in April 2017.

EpMe is the original exploit created by Equation Group around 2013 for a Windows zero-day bug tracked as CVE-2017-2005.

The vulnerability was used for escalating Windows user privileges after gaining access to targeted devices since it’s a local privilege escalation (LPE) bug affecting devices running Windows XP up to Windows 8.

Microsoft patched this security bug in March 2017 and attributed active exploitation to the Chinese-backed APT31 hacking group.

Read more »