vulnerability

  1. Brother

    glibc vulnerability that allows root access to the system

    Qualys has identified a dangerous vulnerability (CVE-2023-6246) in the standard C library Glibc, which allows you to manipulate the launch of SUID applications to execute your code with elevated privileges. Researchers were able to develop a working exploit that allows you to gain root rights by...
  2. Brother

    Vulnerability in GPT-4: rare languages force ChatGPT to give advice on theft and terrorism

    Translation into poorly understood languages allows you to bypass the security restrictions of OpenAI. A recent study by scientists from Brown University in the United States revealed that security restrictions that prevent the GPT-4 neural network from issuing malicious text from OpenAI can be...
  3. Brother

    CVE-2024-20253: Cisco vulnerability allows arbitrary code execution on call center devices

    Cisco urges users to take urgent security measures. Cisco has released updates to address a critical vulnerability affecting Unified Communications and Contact Center products that could allow an unauthenticated remote attacker to execute arbitrary code on the target device. Tracked as...
  4. Brother

    Invisible Godzilla: Apache ActiveMQ vulnerability gives full control over hosts

    Godzilla uses an unknown format to bypass security features. Trustwave warns of a significant increase in the active use of a patched vulnerability in Apache ActiveMQ to deliver the Godzilla web shell to compromised hosts. Web shells are hidden in an unknown binary format and are designed to...
  5. Brother

    Vulnerability in Red Hat patches to the GRUB2 bootloader that allows you to bypass password verification

    Information about a vulnerability (CVE-2023-4001) in patches for the GRUB2 boot loader prepared by Red Hat has been disclosed. The vulnerability allows many systems with UEFI to bypass the password check set in GRUB2 to restrict access to the boot menu or boot loader command line. The...
  6. Brother

    Vulnerability in implementations of the post-quantum encryption algorithm Kyber

    In the implementation of the Kyber encryption algorithm, which won the competition of cryptographic algorithms resistant to brute force on a quantum computer, a vulnerability was identified that allows side-channel attacks to recreate secret keys based on measuring the time of operations during...
  7. Brother

    Problems due to vulnerability reports prepared by AI tools

    Daniel Stenberg, author of a utility for receiving and sending data over the network curl, criticized the use of AI tools when creating vulnerability reports. Such reports include detailed information, are written in normal language and look high-quality, but without thoughtful analysis in...
  8. Brother

    0day vulnerability CVE-2023-51467 in Apache OFBiz caused cyber attacks with access interception

    You should update as soon as possible to avoid leaks of corporate information. A critical zero-day vulnerability has been discovered in the Apache OFBiz system, which is widely used for enterprise resource planning (ERP). It allows you to bypass authentication systems and exposes the business...
  9. Brother

    Battle for data: Agent Tesla successfully infects computers through a multi-year vulnerability in Microsoft Excel

    A long-standing problem and innovative approaches for applying destructive tactics. Recently, attackers have been actively using the Microsoft Office vulnerability, first discovered more than six years ago, in phishing campaigns to distribute Agent Tesla malware. Reports from Zscaler ThreatLabZ...
  10. Brother

    The US National Vulnerability Database has added bitcoin to the list of cyber threats

    Experts fear slowing down the network due to obscurations. National Vulnerability Database (NVD) The United States added bitcoin to its list on December 9, drawing attention to a protocol vulnerability that allowed the development of the Ordinals Protocol in 2022. According to the database...
  11. Brother

    Critical vulnerability in D-Link routers turned out to be fake

    CISA removed the flaw from the catalog, as it turned out to be a dummy. Recently identified vulnerability CVE-2022-28958, added by the CISA agency to the Known Exploited Vulnerability (KEV) catalog, was officially recognized as erroneous and removed from the catalog. This decision came after...
  12. Brother

    Update Android urgently: Fixed Zero Click vulnerability CVE-2023-40088

    This is the most dangerous of the 85 issues that Google is trying to fix in the December security update. Google has released Android security updates for December that address 85 vulnerabilities, including the critical Zero-Click Remote Code Execution (RCE) vulnerability. The Zero-Click bug...
  13. Brother

    Schrodinger Vulnerability: Why Hackers Invent WordPress Security Problems

    An unusual strategy of cybercriminals leads to massive infection of websites with malicious code. WordPress admins are receiving fake security notifications related to a non-existent vulnerability allegedly tracked under the ID CVE-2023-45124. The purpose of the attack is to infect sites with a...
  14. Brother

    Beautiful picture or security? With the LogoFAIL vulnerability, hackers will inject a bootkit into your UEFI without too much noise

    Global threat: hundreds of models of computers and laptops are at risk. Numerous security vulnerabilities collectively known as LogoFAIL allow attackers to interfere with the boot process of computer devices and implement bootkits, due to problems related to image analysis components that...
  15. Lord777

    strongSwan IPsec vulnerability that causes remote code execution

    strongSwan, an IPsec-based VPN package used on Linux, Android, FreeBSD, and macOS, has identified a vulnerability (CVE-2023-41913) that can be used to remotely execute malicious code. The vulnerability is caused by an error in the charon-tkm process with the implementation of the key exchange...
  16. Lord777

    One and a half million bitcoins at risk of theft due to the Randstorm vulnerability

    If your crypto wallet was created before 2016, you should carefully study all the risks. Bitcoin wallets created between 2011 and 2015 may be vulnerable to a new type of exploit called Randstorm. The exploit allows you to recover passwords and gain unauthorized access to a variety of wallets on...
  17. Lord777

    WinRAR vulnerability turned into a cyber weapon for attacks on government organizations

    Asian countries suffer the most, but hackers can hardly expand their activity zone. In the field of cybersecurity, a new serious threat is gaining momentum. A group of cybercriminals known as DarkCasino is exploiting a newly discovered vulnerability in the WinRAR software to launch hacking...
  18. Lord777

    Vulnerability CVE-2023-37580 in Zimbra managed to take advantage of 4 hacker groups at once

    Zero-day in a popular email client resulted in data loss for thousands of users. A zero-day vulnerability was discovered in the Zimbra email software, which was exploited by four different groups of hackers to steal email data, user credentials, and authentication tokens. Google TAG experts...
  19. Lord777

    Reptar vulnerability affecting Intel processors

    Tavis Ormandy, a security researcher at Google, has identified a new vulnerability (CVE-2023-23583) in Intel processors, codenamed Reptar, which is mainly dangerous for cloud systems running virtual machines of different users. The vulnerability can cause the system to freeze or crash when...
  20. Lord777

    Aave suspended some operations due to the vulnerability

    The Aave DeFi protocol suspended some operations after the vulnerability was discovered. The project reported that users ' funds are safe. After confirming the information, community developers have taken the following preventive measures:: * Suspended Aave V2 Ethereum and some assets on...
Top