intelligence gathering
-
CVE-2024-21733 Apache Tomcat HTTP Request High-Risk Information Disclosure Vulnerability
Apache Tomcat 9.0.0-M11 to 9.0.43 Apache Tomcat 8.5.7 to 8.5.63 CVE-2024-21733 Apache Tomcat information disclosure critical vulnerability risk
-
Windows Server Remote Desktop Licensing Services (RDL) 0-Click Remote Code Execution Vulnerability
An unauthenticated remote attacker can achieve remote code execution, resulting in a threatening risk of compromising Windwos servers with Remote Desktop Licensing Services enabled.
-
Windows Local Privilege Escalation (LPE) Zero-Day Vulnerability Sold on the Dark Web
The dark web is selling a Windows Local Privilege Escalation (LPE) zero-day vulnerability that reportedly affects multiple versions of the Windows operating system, including the latest version. This alarming development has been disclosed via an underground marketplace where threat actors have provided detailed specifications and capabilities of the vulnerability.
-
[CVE-2024-32002] Git Code Version Control Software Remote Code Execution Vulnerability with POC/Exploit
CVE-2024-32002 is a vulnerability in Git that enables RCE git clone during operation.By crafting repositories with submodules in a specific way, an attacker can execute malicious hooks by writing files to the directory .git/ using case-insensitive symbolic link handling on the file system.
-
GitHub Enterprise Server Exposed to Serious High-Risk Authentication Bypass Vulnerability
An authentication bypass vulnerability in GitHub Enterprise Server (GHES) when using SAML single sign-on with optional cryptographic assertions can be exploited by an attacker to spoof a SAML response to configure and gain site administrator privileges. This allows an attacker to gain unauthorized access to an instance without prior authentication.
-
UK Government's Artificial Intelligence (AI) Safety Institute launches new AI safety assessment platform
Artificial Intelligence Security Research released Inspect, an open-source testing platform designed to assess the safety and performance of AI models.Inspect detects the core knowledge, reasoning and autonomy of AI models, fostering the development of the global AI community, and Inspect becomes a cornerstone of AI security research.
-
Google Cloud mistakenly deletes user accounts leading to data loss and prolonged business downtime
According to The Guardian, Google Cloud Services recently suffered a major, never-before-seen misconfiguration incident that resulted in the deletion of a cloud subscription account for Australia's UniSuper fund and a week-long disruption in service.
UniSuper is a not-for-profit pension fund that manages a massive $125 billion with over half a million investors.
Although UniSuper made data backups in two cloud regions of Google Cloud, this major incident was caused by account deletions, resulting in the loss of both backups at the same time, which did not provide protection.
It was good that UniSuper had data backed up with other storage providers as well, which minimized the damage caused by this incident and accelerated the process of UniSuper's recovery of data on Google Cloud. -
Palo Alto Networks Firewall Exposed to Zero-Day Vulnerability, Hacker Groups Use Implanted Backdoor Programs to Steal Data
A critical zero-day vulnerability (CVE-2024-3400) in Palo Alto Networks PAN-OS software has been actively exploited by the hacker group UTA0218 in an attack campaign codenamed "Operation Midnight Eclipse". The vulnerability allows attackers to plant a Python backdoor program, gain system privileges, and perform lateral movement and data theft on the victim's network. Affected devices include PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls with the GlobalProtect gateway and device telemetry enabled.Palo Alto Networks has issued a security advisory with a remediation patch, and recommends users update as soon as possible.
-
How to Spot Attackers in the Early Stages of the Cyber Kill Chain
How to detect and stop suspicious activity before it evolves into a more serious threat. For example, by using OSINT (Open Source Intelligence) technology and network traffic monitoring, organizations can stay one step ahead of attackers and protect their networks and sensitive data from devastating cyberattacks.
-
Open Source Software Grafana Platform SQL Injection High Risk Vulnerability
An injection vulnerability exists in the open source software grafana, where an attacker can use a post request to the /api/ds/query api, and then they can modify the "rawSql" file to execute a malicious sql string, resulting in a blind time-based sql injection vulnerability that poses the threat of a database compromise.