Security Bulletin
27 Jan 2025
Biztonsági szemle
Severe Meta Llama issue risks RCE in AI systems
Such an RCE flaw, which was given a critical severity designation by Snyk, impacts the Llama Stack component, particularly in the implementation of the reference Python Inference API, which automates Python object deserialization through the risky...
27 Jan 2025
Biztonsági szemle
Alleged TalkTalk data compromise under scrutiny
Such data compromise may have been achieved through an intrusion against a third-party supplier, which did not have any access to billing or financial details, according to TalkTalk Head of External Communications Liz Holloway, who did not name the...
27 Jan 2025
Biztonsági szemle
Updated Change Healthcare breach toll reaches nearly 190M
Attackers who infiltrated Change Healthcare using unsecured account credentials were not only able to exfiltrate individuals' names, birthdates, home and email addresses, Social Security numbers, and other government IDs but also their health...
27 Jan 2025
Biztonsági szemle
XWorm RAT builder leveraged for widespread device compromise
Amateur threat actors have been targeted by the attacker using the "@shinyenigma" and "milleniumrat" aliases with the altered XWorm RAT builder, which not only exfiltrates data via Telegram bot tokens and API calls but also enables registry...
27 Jan 2025
Biztonsági szemle
Suspected Phemex hack leads to theft of over $69M
Such an incident — which comes within six months of separate crypto heists against fellow Singaporean cryptocurrency platforms BingX and Penpie — showcased levels of sophistication that could have only been conducted by North Korean threat actors...
27 Jan 2025
Biztonsági szemle
RID hijacking conducted by Andariel
After leveraging a vulnerability and the privilege escalation tools PsExec and JuicyPotato to gain SYSTEM access on targeted devices, Andariel stealthily established a low-privilege local user before altering the Security Account Manager registry to...
27 Jan 2025
Biztonsági szemle
Covert VMware ESXI-targeted ransomware hack facilitated by SSH tunneling
After infiltrating ESXi instances by leveraging known vulnerabilities or stolen admin credentials, ransomware gangs proceed to utilize the built-in SSH service to facilitate lateral movement and ransomware delivery without being detected, according...
26 Jan 2025
Biztonsági szemle
AI Red Teaming Comes to Bug Bounties - Michiel Prins - ESW #391
24 Jan 2025
Biztonsági szemle
CISOs Are Gaining C-Suite Swagger, but Has It Come With a Cost?
The number of CISOs who report directly to the CEO is up sharply in recent years, but many still say it's not enough to secure adequate resources.
24 Jan 2025
Biztonsági szemle
Attacks on Ivanti appliances demonstrate danger of chained exploits
CISA warned that attackers are chaining a number of CVE-listed vulnerabilities into a single exploit script.
24 Jan 2025
Biztonsági szemle
Reddit, WeTransfer pages spoofed in Lumma Stealer campaign
Nearly 1,000 imitation pages were discovered, targeting users looking for other software.
24 Jan 2025
Biztonsági szemle
Cursive Funk, Microsoft, Ivanti, Sonic Wall, Exchange, PowerSchool, Aaran Leyland... - SWN #445
Pagination
- Previous page ‹‹
- Page 289
- Next page ››