Lucene search

K

N'Vision Clinician Programmer Security Vulnerabilities

krebs
krebs

How Did Authorities Identify the Alleged Lockbit Boss?

Last week, the United States joined the U.K. and Australia in sanctioning and charging a Russian man named Dmitry Yuryevich Khoroshev as the leader of the infamous LockBit ransomware group. LockBit's leader "LockBitSupp" claims the feds named the wrong guy, saying the charges don't explain how...

7.1AI Score

2024-05-13 11:26 AM
6
cve
cve

CVE-2024-31412

Out-of-bounds read vulnerability exists in CX-Programmer included in CX-One CXONE-AL[][]D-V4 Ver. 9.81 or lower. Opening a specially crafted project file may lead to information disclosure and/or the product being...

6.8AI Score

0.0004EPSS

2024-05-01 01:15 PM
27
cvelist
cvelist

CVE-2024-31412

Out-of-bounds read vulnerability exists in CX-Programmer included in CX-One CXONE-AL[][]D-V4 Ver. 9.81 or lower. Opening a specially crafted project file may lead to information disclosure and/or the product being...

6.5AI Score

0.0004EPSS

2024-05-01 12:52 PM
3
ics
ics

Unitronics Vision Legacy Series (Update A)

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Unitronics Equipment: Vision Legacy series Vulnerability: Storing Passwords in a Recoverable Format 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to...

8AI Score

0.0004EPSS

2024-04-30 12:00 PM
15
krebs
krebs

Russian FSB Counterintelligence Chief Gets 9 Years in Cybercrime Bribery Scheme

The head of counterintelligence for a division of the Russian Federal Security Service (FSB) was sentenced last week to nine years in a penal colony for accepting a USD $1.7 million bribe to ignore the activities of a prolific Russian cybercrime group that hacked thousands of e-commerce websites......

6.8AI Score

2024-04-22 08:07 PM
6
talosblog
talosblog

OfflRouter virus causes Ukrainian users to upload confidential documents to VirusTotal

During a threat-hunting exercise, Cisco Talos discovered documents with potentially confidential information originating from Ukraine. The documents contained malicious VBA code, indicating they may be used as lures to infect organizations. The results of the investigation have shown that the...

7AI Score

2024-04-17 11:59 AM
9
packetstorm

7.4AI Score

0.001EPSS

2024-04-15 12:00 AM
81
exploitdb

7.4AI Score

0.001EPSS

2024-04-15 12:00 AM
62
zdt

7AI Score

0.001EPSS

2024-04-15 12:00 AM
52
thn
thn

Python's PyPI Reveals Its Secrets

GitGuardian is famous for its annual State of Secrets Sprawl report. In their 2023 report, they found over 10 million exposed passwords, API keys, and other credentials exposed in public GitHub commits. The takeaways in their 2024 report did not just highlight 12.8 million new exposed secrets in...

7.3AI Score

2024-04-11 11:32 AM
12
thn
thn

Python's PyPI Reveals Its Secrets

GitGuardian is famous for its annual State of Secrets Sprawl report. In their 2023 report, they found over 10 million exposed passwords, API keys, and other credentials exposed in public GitHub commits. The takeaways in their 2024 report did not just highlight 12.8 million new exposed secrets in...

7.3AI Score

2024-04-11 11:32 AM
22
kitploit
kitploit

Noia - Simple Mobile Applications Sandbox File Browser Tool

Noia is a web-based tool whose main aim is to ease the process of browsing mobile applications sandbox and directly previewing SQLite databases, images, and more. Powered by frida.re. Please note that I'm not a programmer, but I'm probably above the median in code-savyness. Try it out, open an...

7.2AI Score

2024-03-27 11:30 AM
13
spring
spring

Bootiful Spring Boot in 2024 (part 1)

NB: the code is here on my Github account: github.com/joshlong/bootiful-spring-boot-2024-blog. Hi, Spring fans! I'm Josh Long, and I work on the Spring team. I'm excited to be keynoting and giving a talk at Microsoft's JDConf this year. I'm a Kotlin GDE and a Java Champion, and I'm of the opinion.....

6.9AI Score

2024-03-11 12:00 AM
12
openvas
openvas

Fedora: Security Advisory for antlrworks (FEDORA-2024-129d8ca6fc)

The remote host is missing an update for...

7AI Score

0.0004EPSS

2024-03-08 12:00 AM
5
openvas
openvas

Fedora: Security Advisory for jdom (FEDORA-2024-129d8ca6fc)

The remote host is missing an update for...

7AI Score

0.0004EPSS

2024-03-08 12:00 AM
3
openvas
openvas

Fedora: Security Advisory for log4j (FEDORA-2024-129d8ca6fc)

The remote host is missing an update for...

7AI Score

0.0004EPSS

2024-03-08 12:00 AM
2
fedora
fedora

[SECURITY] Fedora 40 Update: log4j-2.20.0-7.fc40

Log4j is a tool to help the programmer output log statements to a variety of output...

6.7AI Score

0.0004EPSS

2024-03-07 10:33 PM
4
fedora
fedora

[SECURITY] Fedora 40 Update: jdom-1.1.3-37.fc40

JDOM is, quite simply, a Java representation of an XML document. JDOM provides a way to represent that document for easy and efficient reading, manipulation, and writing. It has a straightforward API, is a lightweight and fast, and is optimized for the Java programmer. It's an alternative to DOM...

6.8AI Score

0.0004EPSS

2024-03-07 10:33 PM
6
fedora
fedora

[SECURITY] Fedora 40 Update: antlrworks-1.5.2-29.fc40

ANTLRWorks is a novel grammar development environment for ANTLR v3 grammars written by Jean Bovet (with suggested use cases from Terence Parr). It comb ines an excellent grammar-aware editor with an interpreter for rapid prototyping and a language-agnostic debugger for isolating grammar errors....

6.8AI Score

0.0004EPSS

2024-03-07 10:32 PM
3
trellix
trellix

The Dark Side of Innovation: Cybercriminals and Their Adoption of GenAI

The Dark Side of Innovation: Cybercriminals and Their Adoption of GenAI By Jambul Tologonov and John Fokker · March 06, 2024 In the ever-evolving threat landscape, the Trellix Advanced Research Center has been at the forefront of understanding and combating the dual-edged sword of Generative...

6.9AI Score

2024-03-06 12:00 AM
11
osv
osv

XSS sidekiq-unique-jobs UI server vulnerability

Summary Cross site scripting (XSS) potentially exposing cookies / sessions / localStorage, fixed by sidekiq-unique-jobs v8.0.7. Specifically, this is a Reflected (Server-Side), Non-Self, Cross Site Scripting vulnerability, considered a P3 on the BugCrowd taxonomy with the following categorization:....

7.7AI Score

0.028EPSS

2024-02-13 06:34 PM
9
github
github

XSS sidekiq-unique-jobs UI server vulnerability

Summary Cross site scripting (XSS) potentially exposing cookies / sessions / localStorage, fixed by sidekiq-unique-jobs v8.0.7. Specifically, this is a Reflected (Server-Side), Non-Self, Cross Site Scripting vulnerability, considered a P3 on the BugCrowd taxonomy with the following categorization:....

7.7AI Score

0.0004EPSS

2024-02-13 06:34 PM
11
schneier
schneier

Chatbots and Human Conversation

For most of history, communicating with a computer has not been like communicating with a person. In their earliest years, computers required carefully constructed instructions, delivered through punch cards; then came a command-line interface, followed by menus and options and text boxes. If you.....

6.9AI Score

2024-01-26 12:09 PM
8
wallarmlab
wallarmlab

tRPC vs GraphQL

Deciphering the Cloud Conundrum: An Introduction to tRPC & GraphQL The dynamic domain of cloud technology presents a couple of instrumental methodologies in the arena of APIs: tRPC and GraphQL. Each serves as a potent asset for developers in crafting applications that are resilient, scalable, and.....

7.1AI Score

2024-01-19 10:24 AM
25
talosblog
talosblog

Exploring malicious Windows drivers (Part 1): Introduction to the kernel and drivers

Drivers have long been of interest to threat actors, whether they are exploiting vulnerable drivers or creating malicious ones. Malicious drivers are difficult to detect and successfully leveraging one can give an attacker full access to a system. Real-world examples can be found in our previous...

6.8AI Score

2024-01-18 01:00 PM
4
openvas
openvas

Fedora: Security Advisory for libssh (FEDORA-2023-55800423a8)

The remote host is missing an update for...

6.6AI Score

0.962EPSS

2024-01-18 12:00 AM
6
redhat
redhat

(RHSA-2024:0188) Moderate: Red Hat OpenStack Platform 17.1 (python-eventlet) security update

Eventlet is a networking library written in Python. It achieves high scalability by using non-blocking io while at the same time retaining high programmer usability by using coroutines to make the non-blocking io operations appear blocking at the source code level. Security Fix(es): patch...

7.3AI Score

0.001EPSS

2024-01-16 02:14 PM
7
redhat
redhat

(RHSA-2024:0213) Moderate: Red Hat OpenStack Platform 17.1 (python-eventlet) security update

Eventlet is a networking library written in Python. It achieves high scalability by using non-blocking io while at the same time retaining high programmer usability by using coroutines to make the non-blocking io operations appear blocking at the source code level. Security Fix(es): patch...

7.3AI Score

0.001EPSS

2024-01-16 02:13 PM
10
thn
thn

Case Study: The Cookie Privacy Monster in Big Global Retail

Explore how an advanced exposure management solution saved a major retail industry client from ending up on the naughty step due to a misconfiguration in its cookie management policy. This wasn't anything malicious, but with modern web environments being so complex, mistakes can happen, and...

6.8AI Score

2024-01-16 01:23 PM
25
fedora
fedora

[SECURITY] Fedora 38 Update: libssh-0.10.6-2.fc38

The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, tra nsfer files, use a secure and transparent tunnel for your remote...

7.5AI Score

0.962EPSS

2024-01-10 01:52 AM
10
openvas
openvas

Fedora: Security Advisory for libssh (FEDORA-2023-0733306be9)

The remote host is missing an update for...

6.6AI Score

0.962EPSS

2023-12-23 12:00 AM
2
fedora
fedora

[SECURITY] Fedora 39 Update: libssh-0.10.6-1.fc39

The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, tra nsfer files, use a secure and transparent tunnel for your remote...

7.5AI Score

0.962EPSS

2023-12-22 02:44 AM
13
securelist
securelist

Story of the year: the impact of AI on cybersecurity

In the whirlwind of technological advancements and societal transformations, the term "AI" has undoubtedly etched itself into the forefront of global discourse. Over the past twelve months, this abbreviation has resonated across innumerable headlines, business surveys and tech reports, firmly...

7.7AI Score

2023-12-11 10:00 AM
11
thn
thn

SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs

Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to leak sensitive information from kernel memory on current and upcoming CPUs from Intel, AMD, and Arm. The attack is an end-to-end exploit for Spectre based on a new...

7.5CVSS

6.9AI Score

0.002EPSS

2023-12-09 11:52 AM
17
malwarebytes
malwarebytes

Android phones can be taken over remotely – update when you can

Android phones are vulnerable to attacks that could allow someone to takeover a device remotely without the device owner needing to do anything. Updates for these vulnerabilities and more are included in Google's Android security bulletin for December. In total, there are patches for 94...

8.8CVSS

8.4AI Score

0.001EPSS

2023-12-07 12:07 PM
17
thn
thn

LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks

The Unified Extensible Firmware Interface (UEFI) code from various independent firmware/BIOS vendors (IBVs) has been found vulnerable to potential attacks through high-impact flaws in image parsing libraries embedded into the firmware. The shortcomings, collectively labeled LogoFAIL by Binarly,...

8.1AI Score

2023-12-04 06:53 AM
55
malwarebytes
malwarebytes

Will ChatGPT write ransomware? Yes.

This morning I decided to write some ransomware, and I asked ChatGPT to help. Not because I wanted to turn to a life of crime, but because I wanted to see if anything had changed since March, when I last tried the same exact thing. In short: ChatGPT has helped me, worryingly so. But more on that...

6.9AI Score

2023-11-30 07:53 PM
5
wallarmlab
wallarmlab

FREE Cybersecurity Education Courses

Navigating the nuanced realm of digital defense doesn't need to feel like a herculean task. This section aims to shed light on the intricacies of digital defense and aid you in leveraging freely available Cybersecurity Learning Programs. Deciphering Digital Defense Digital defense, also referred...

7.5AI Score

2023-11-15 06:46 PM
10
qualysblog
qualysblog

Qualys API Best Practices: Web Application Scanning API

This API Best Practices Series is designed for Qualys customer programmers or stakeholders with a general knowledge of programming who want to implement best practices for improving the development, design, and performance of their programs that use the Qualys API. For non-customers, the Qualys...

7.3AI Score

2023-10-26 04:24 PM
22
kitploit
kitploit

Spoofy - Program That Checks If A List Of Domains Can Be Spoofed Based On SPF And DMARC Records

Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records. You may be asking, "Why do we need another tool that can check if a domain can be spoofed?" Well, Spoofy is different and here is why: Authoritative lookups on all lookups with known fallback...

6.8AI Score

2023-10-11 06:26 PM
14
pentestpartners
pentestpartners

IoT Secure Development Guide

Introduction This guide deals with threat modelling and early stages of development so that security issues and controls are identified before committing to manufacturing. Current attack methods, and the pitfalls we find in embedded designs, have been highlighted so that a finished product is as...

8AI Score

2023-10-10 05:04 AM
31
hackerone
hackerone

curl: [Critical] Curl CVE-2023-38545 vulnerability code changes are disclosed on the internet

Summary: Curl CVE-2023-38545 vulnerability code changes are disclosed on the internet Steps To Reproduce: To replicate the issue, I have searched in the Bard about this vulnerability. It disclosed what this vulnerability is about, code changes made for this fix, who made these changes, commit...

9.8CVSS

7.8AI Score

0.001EPSS

2023-10-10 04:25 AM
146
spring
spring

This Week in Spring - October 10th, 2023

Hi, Spring fans! Welcome to another installment of This Week in Spring! Last week I was in Antwerp, Belgium, for the amazing Devoxx Belgium event, and this week I've been in Amsterdam for the SpringOne Tour Amsterdam stop and - in the middle of the SpringOne Tour Amsterdam event - I dipped out to.....

6.7AI Score

2023-10-10 12:00 AM
4
krebs
krebs

‘Snatch’ Ransom Group Exposes Visitor IP Addresses

The victim shaming site operated by the Snatch ransomware group is leaking data about its true online location and internal operations, as well as the Internet addresses of its visitors, KrebsOnSecurity has found. The leaked data suggest that Snatch is one of several ransomware groups using paid...

6.9AI Score

2023-09-27 11:48 AM
22
krebs
krebs

Who’s Behind the 8Base Ransomware Website?

The victim shaming website operated by the cybercriminals behind 8Base -- currently one of the more active ransomware groups -- was until earlier today leaking quite a bit of information that the crime group probably did not intend to be made public. The leaked data suggests that at least some of.....

6.7AI Score

2023-09-19 02:12 AM
21
malwarebytes
malwarebytes

ThemeBleed exploit is another reason to patch Windows quickly

Included in the September 2023 Patch Tuesday updates was a fix for a vulnerability which has been dubbed ThemeBleed. A Proof-of-Concept (PoC) exploit has been released by Gabe Kirkpatrick, one of the researchers acknowledged for reporting the vulnerability. The Common Vulnerabilities and Exposures....

8.8CVSS

7.4AI Score

0.011EPSS

2023-09-18 03:00 AM
11
openvas
openvas

Fedora: Security Advisory for rubygem-rails (FEDORA-2023-4f0bb4ff5e)

The remote host is missing an update for...

7.5AI Score

2023-09-16 12:00 AM
5
fedora
fedora

[SECURITY] Fedora 39 Update: rubygem-rails-7.0.7.2-1.fc39

Ruby on Rails is a full-stack web framework optimized for programmer happin ess and sustainable productivity. It encourages beautiful code by favoring convention over...

7.2AI Score

2023-09-15 07:04 PM
4
schneier
schneier

LLMs and Tool Use

Last March, just two weeks after GPT-4 was released, researchers at Microsoft quietly announced a plan to compile millions of APIs--tools that can do everything from ordering a pizza to solving physics equations to controlling the TV in your living room--into a compendium that would be made...

6.6AI Score

2023-09-08 11:05 AM
17
malwarebytes
malwarebytes

Zoom clarifies user consent requirement when training its AI

Changes in the terms of service (TOS) of the Zoom video-conferencing software have caused some turmoil. Since the pandemic, Zoom (Video Conferencing) has become a household name. Zoom came up as the big winner in the video conferencing struggle that enabled us to work from home. Now that things...

7AI Score

2023-08-11 10:45 AM
8
Total number of security vulnerabilities1305