Avatar
Herjan Security
b7ac607467d380da39561027a5bd00a900e99a56019f127db61f86a3c842efb6
[.] Nostrop stream of GenAI news and updates

#WindowsUpdate #ZeroDays #Vulnerabilities #Microsoft #PatchTuesday #CyberSecurity #InformationDisclosure #ElevationOfPrivilege #RemoteCodeExecution #SecurityFeatureBypass #Spoofing #DenialOfService

https://cybersecuritynews.com/windows-patch-52-vulnerabilities/

ANY.RUN is an interactive malware sandbox tool that offers real-time analysis of malware behavior. It allows users to understand the capabilities of malware and how it can spread. With ANY.RUN, users can collect information about the sample, including file system activity and network traffic. It can be used to analyze phishing emails, investigate zero-day attacks, ensure proactive defense, and train security analysts. By utilizing a sandbox environment, businesses can stay better protected against evolving threats in the cyber landscape. #cybersecurity #malware

https://cybersecuritynews.com/interactive-malware-sandbox-for-business/

Summary: Adobe has released a security update to fix a critical zero-day vulnerability (CVE-2023-26369) in Adobe Acrobat PDF and Reader for Windows and macOS. The vulnerability allows attackers to execute arbitrary code on unprotected PCs. Adobe advises users to install the patch promptly. Additionally, they addressed two cross-site scripting vulnerabilities in Adobe Connect and Adobe Experience Manager. So far this year, there have been 64 recorded zero-day attacks targeting various software products.

Hashtags: #Adobe #cybersecurity #vulnerability

https://cybersecuritynews.com/adobe-pdf-creator-zero-day/

Microsoft patched two zero-day vulnerabilities in its September Patch Tuesday. The first vulnerability, CVE-2023-36761, is an information disclosure vulnerability in Microsoft Word. The second vulnerability, CVE-2023-36802, is an elevation of privilege vulnerability in the Microsoft Streaming Service Proxy. In addition to these fixes, there are patches for four critical remote code execution vulnerabilities, three of which impact Visual Studio. The fourth critical bug, CVE-2023-38148, is found in Windows Internet Connection Sharing. #Microsoft #PatchTuesday #ZeroDay #Vulnerabilities #CVE #Infosecurity

https://www.infosecurity-magazine.com/news/fixes-two-zeroday-bugs-used-attacks/

A recent cyberattack used a malicious Word document delivered via phishing emails, triggering the download of malware payloads. The payloads include OriginBotnet, RedLine Clipper, and Agent Tesla, which are used for keylogging, cryptocurrency theft, and sensitive information gathering. OriginBotnet gathers crucial data from infected Windows machines and communicates with a C2 server. The attack displayed clever methods to avoid detection and maintain persistence. #OriginBotnet #WordDocument #CyberAttack

https://cybersecuritynews.com/originbotnet-attack-windows/

Summary: SAP has released security patches for 13 vulnerabilities, including code injection and memory corruption. The severity ranges from low to critical. The vulnerabilities affect multiple SAP products, such as SAP Business Client, Business Intelligence Platform, and SAP S/4HANA.

Hashtags: #SAP #security #vulnerabilities #codeinjection #memorycorruption #cybersecurity

https://cybersecuritynews.com/sap-security-vulnerabilities/

Summary (5 sentences):

- Cisco Secure Application, previously known as Security Insights for Cloud Native Application Observability, is now available on Cisco's Full-Stack Observability Platform.

- The purpose of Secure Application is to improve the security of cloud-native or hybrid applications by bringing together application and security teams.

- Rushing product releases without considering security has led to an increase in vulnerabilities and security incidents.

- Cisco Secure Application offers expanded visibility and business-risk insights across cloud environments, as well as real-time remediation guidance for security incidents.

- The Cisco Full-Stack Observability Platform integrates data from various sources to provide comprehensive insights across the multi-cloud environment and technology stack.

Hashtags (3 hashtags):

#ApplicationSecurity #CloudSecurity #Observability

https://www.csoonline.com/article/652025/cisco-secure-application-brings-app-and-security-teams-together.html

Cars Have Terrible Data Privacy. A new report by the Mozilla Foundation finds that all car brands have poor data privacy. This makes cars the worst category for privacy among products reviewed. The report reveals alarming details about the data collection practices of car manufacturers. #Cars #DataPrivacy #PrivacyProtection #Mozilla

https://www.schneier.com/blog/archives/2023/09/cars-have-terrible-data-privacy.html

1. Departure of employees can introduce vulnerabilities and risks if not handled properly.

2. Well-defined process for staff departures is crucial for maintaining operational continuity and safeguarding sensitive information.

3. Revoking access to systems, networks, and databases is important to prevent unauthorized entry.

4. Departing employees may retain copies of sensitive data without a proper process in place.

5. Collecting company-issued devices promptly helps mitigate potential vulnerabilities.

6. Documenting roles, responsibilities, and procedures maintains a well-prepared workforce.

7. Following a strict off-boarding process minimizes the risk of insider threats.

8. Proper management of staff departures prevents non-compliance with data protection and privacy regulations.

9. Clear process ensures seamless transition of tasks and critical cybersecurity measures.

10. Establishing a well-defined process for staff departures protects sensitive data and mitigates cybersecurity risks.

Hashtags: #Cybersecurity #DataProtection #InsiderThreats #ProcessManagement #ITSecurity

https://www.itsecurityguru.org/2023/09/12/dont-leave-cybersecurity-to-chance/

Adobe has revealed that a critical zero-day vulnerability in its PDF Reader is being actively exploited by hackers. The vulnerability, known as CVE-2023-26369, allows for code execution attacks and affects both Windows and macOS installations. This is one of several flaws addressed in Adobe's recent Patch Tuesday updates. So far this year, there have been 64 documented in-the-wild zero-day attacks. #Adobe #PDF #vulnerability #cybersecurity

https://www.securityweek.com/adobe-says-critical-pdf-reader-zero-day-being-exploited/

Intel Capital has invested in Israeli security startup Zenity, which has raised $16.5 million in a Series A funding round. The company is focused on developing technology for securing the low-code/no-code development ecosystem, where developers and designers build applications without traditional coding. Zenity aims to help organizations with continuous visibility and risk assessment, as well as setting automated guardrails for security. The funding will be used for hiring and go-to-market activities. #Intel #Zenity #LowCode #NoCode #Security #VentureCapital

Note: The provided text doesn't have much relevant information, so the summary is quite short.

https://www.securityweek.com/intel-capital-bets-on-zenity-for-low-code-no-code-security/

Zero Day Summer: Microsoft warns of fresh new software exploits. #CybersecurityNews #Malware #Threats #ZeroDay #SoftwareExploits #PatchTuesday.

https://www.securityweek.com/zero-day-summer-microsoft-warns-of-fresh-new-software-exploits/

MGM Resorts experienced a cybersecurity incident, causing trouble for its main website, online bookings, and in-casino services. The incident appears to be a ransomware attack and has impacted a significant number of systems. Customers should be cautious of anyone claiming to be from MGM Resorts. Shutting down systems is a standard move to prevent further attacks, but it results in financial losses for the company. The full extent of the attack is still unknown. #MGMResorts #Cybersecurity #RansomwareAttack #NetworkSecurity

https://www.infosecurity-magazine.com/news/mgm-resorts-hit-cyber-attack/

AI chatbots are being "jailbroken" by cyber-criminals, allowing them to bypass safety measures and share uncensored content. #AIchatbots #jailbreaking #cybersecurity

Users are exploiting vulnerabilities in chatbot systems to unleash unregulated content and raise ethical concerns. #exploitation #unregulatedcontent #ethicalconcerns

Online communities have emerged where users share strategies and tactics for jailbreaking AI chatbots. #onlinecommunities #strategies #tactics

Cyber-criminals have developed tools to use jailbroken chatbots for malicious purposes. #cybercriminals #maliciouspurposes #tools

Organizations like OpenAI are taking steps to enhance chatbot security through vulnerability assessments and access controls. #OpenAI #securityenhancements #vulnerabilityassessments

https://www.infosecurity-magazine.com/news/cybercriminals-jailbreak-ai/

A multi-stage malware attack targeting Windows systems has been discovered. The attack begins with a phishing email containing a malicious Word document. The document triggers an embedded malicious link, which sets the stage for the attack's progression. The attack employs encryption and decryption techniques to conceal its activities. The malware includes components for keylogging, cryptocurrency theft, and data exfiltration. Organizations are urged to bolster their cybersecurity defenses and educate employees on phishing email risks. #WindowsSystems #MalwareAttack #Phishing #Cybersecurity

https://www.infosecurity-magazine.com/news/windows-targeted-multi-stage/

Massive Ransomware Attack on SriLanka Wipes Out Data. #Ransomware #SriLanka

https://cybersecuritynews.com/ransomware-attack-srilanka/

#CyberAttack #Airbus #DataBreach #Hackers #VendorDataAccessed #CyberSecurityNews

https://cybersecuritynews.com/airbus-cyber-attack/

Google has patched a zero-day vulnerability in Chrome, known as CVE-2023-4863, which is the fourth zero-day vulnerability found in the browser this year. The bug, rated as critical severity, is a heap buffer overflow issue in the WebP component. Google states that the vulnerability was reported by Apple Security Engineering and Architecture and The Citizen Lab. The vulnerability is believed to have been exploited by a commercial spyware vendor. The latest Chrome update, version 116.0.5845.187, is now available for download.

#Google #Chrome #vulnerability #patch #zero-day

https://www.securityweek.com/google-patches-chrome-zero-day-reported-by-apple-spyware-hunters/

Financial crime is on the rise, impacting millions and generating billions of euros. Technology, including encrypted messaging apps and cryptocurrency, plays a key role in enabling these crimes. Legitimate fintech innovations can also be exploited by criminals. Money laundering and corruption are identified as critical engines of financial crime. Geopolitical tensions, such as Russia's invasion of Ukraine, contribute to the vulnerability of society. Financial crimes undermine society and target vulnerable populations. #FinancialCrime #Technology #MoneyLaundering #Geopolitics #VulnerablePopulations

https://www.infosecurity-magazine.com/news/europol-financial-economic-crime/

The US government has ordered federal agencies to urgently patch Apple zero-day bugs. The Cybersecurity and Infrastructure Security Agency (CISA) has given agencies until October 2 to update their iOS, iPadOS, and macOS devices to mitigate the risk of spyware attacks. The zero-day flaws in Apple's products were discovered by Citizen Lab and were used to deliver the Pegasus spyware. The bugs include a buffer overflow vulnerability in ImageIO and a validation issue in Apple Wallet. The concern is that these exploits could be used to target US government officials. The US government has previously sued NSO Group, the commercial malware developer behind the Pegasus spyware. #USGovernment #Apple #Cybersecurity #ZeroDay #Pegasus

https://www.infosecurity-magazine.com/news/us-government-ordered-patch-apple/