intelligence gathering
-
North Korea's Lazarus group exploits known security vulnerabilities to attack software vendors
The Lazarus group is a highly active cyber threat actor that reports may be related to the North Korean government. It has been continuously improving its attack techniques and finding new targets and vulnerabilities to exploit. They are known for their attacks against software vendors, financial institutions, and cryptocurrency exchanges, using social engineering, phishing emails, and malware distribution to steal sensitive information and funds.
-
Security vulnerability discovered in Kubernetes NGINX ingress controller
Kubernetes is a popular container orchestration platform used to manage and deploy containerized applications. NGINX is a commonly used open source reverse proxy and load balancer that is widely used in Kubernetes clusters as an ingress controller.
-
HTTP/2 zero-day vulnerability (CVE-2023-44487) triggered the largest denial of service attack in history
Recently, Google announced the HTTP/2 protocol vulnerability CVE-2023-44487.
Attackers can use this vulnerability to launch low-cost and very large-scale attacks (http2-rapid-reset-ddos-attack). Attackers used this method to launch attacks on Google Cloud Platform customers starting in August. In one attack, the attacker issued up to 398 million requests in 1 second, which is also the highest number of requests per second on record. an attack. -
[Early Warning] Serious security vulnerabilities exposed in curl and libcurl libraries
Description: cURL is a widely used multi-functional open source command line tool that uses URL syntax to transmit data and supports a variety of network protocols including SSL, TLS, HTTP, FTP, and SMTP. libcurl is…
-
[Warning] Webp image processing component vulnerability
Vulnerability description: CVE-2023-4863 is a serious heap buffer overflow vulnerability in WebP, a raster graphics file format that replaces the JPEG, PNG, and GIF file formats. Buffer overflow possible...
-
Predator software exploits Apple zero-day vulnerability to attack Egyptian government
A piece of spyware called Predator exploited Apple's new zero-day vulnerability to target a former Egyptian lawmaker. The discovery of this attack further emphasizes the importance of cybersecurity, especially for politicians and public figures.
-
The Cyberspace Administration of China imposes penalties on CNKI for illegally handling personal information
On September 1, the Cyberspace Administration of China, in accordance with the Cybersecurity Law, the Personal Information Protection Law, the Administrative Penalty Law and other laws and regulations, comprehensively considered the nature, consequences, and duration of the illegal processing of personal information by CNKI, In particular, due to factors such as the network security review situation, CNKI made a decision on administrative penalties related to network security review in accordance with the law, ordered it to stop illegal processing of personal information, and imposed a fine of RMB 50 million.
-
[Vulnerability Warning] Unauthorized vulnerability in the API interface of the private version of Enterprise WeChat
Recently, a backend API execution permission vulnerability in the historical version of enterprise WeChat privatization was discovered. An attacker can obtain address book information and application permissions by sending specific messages. Through the API with vulnerability risk, https://cncso.com/cgi- The bin/gateway/agentinfo interface can directly obtain sensitive information such as corporate WeChat secrets without authorization, which can lead to the acquisition of all corporate WeChat data, file acquisition, and the use of corporate WeChat light applications to send phishing files and links within the enterprise.
-
Malicious AI tool FraudGPT is sold on the dark web, causing network security issues
With the rise of generative AI models, the threat landscape has changed dramatically. Now another hacker has created a malicious AI tool called FraudGPT, which is specifically used for attack purposes, such as making spear phishing emails, creating cracking tools, carding, etc. The tool is currently for sale on various darknet markets and Telegram platforms. It is said to be "capable of generating a variety of network attack codes" and "more than 3,000 buyers have placed orders in less than a week."
-
AsyncRAT malware analysis practice using Chatgpt
Explore how ChatGPT can assist in analyzing malware, specifically the Remote Access Trojan (RAT) AsyncRAT, and delve into ChatGPT's ability to discuss how it can assist in identifying threat indicators by analyzing network traffic and revealing command and control (C2) infrastructure.