Tag: code execution

  • Krebs on Security: Microsoft Patch Tuesday, November 2024 Edition

    Source URL: https://krebsonsecurity.com/2024/11/microsoft-patch-tuesday-november-2024-edition/ Source: Krebs on Security Title: Microsoft Patch Tuesday, November 2024 Edition Feedly Summary: Microsoft today released updates to plug at least 89 security holes in its Windows operating systems and other software. November’s patch batch includes fixes for two zero-day vulnerabilities that are already being exploited by attackers, as well as two…

  • The Register: HTTP your way into Citrix’s Virtual Apps and Desktops with fresh exploit code

    Source URL: https://www.theregister.com/2024/11/12/http_citrix_vuln/ Source: The Register Title: HTTP your way into Citrix’s Virtual Apps and Desktops with fresh exploit code Feedly Summary: ‘Once again, we’ve lost a little more faith in the internet,’ researcher says Researchers are publicizing a proof of concept (PoC) exploit for what they’re calling an unauthenticated remote code execution (RCE) vulnerability…

  • Hacker News: Windows Process Injection

    Source URL: https://www.outflank.nl/blog/2024/10/15/introducing-early-cascade-injection-from-windows-process-creation-to-stealthy-injection/ Source: Hacker News Title: Windows Process Injection Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text introduces a novel process injection technique dubbed Early Cascade Injection, which enhances existing methods by executing more stealthily against Endpoint Detection and Response (EDR) systems. The author provides a detailed technical analysis of Windows…

  • Hacker News: A New Era of macOS Sandbox Escapes: Overlooked Attack Surface, 10+ New Vulns

    Source URL: https://jhftss.github.io/A-New-Era-of-macOS-Sandbox-Escapes/ Source: Hacker News Title: A New Era of macOS Sandbox Escapes: Overlooked Attack Surface, 10+ New Vulns Feedly Summary: Comments AI Summary and Description: Yes Summary: The blog post discusses a series of novel sandbox escape vulnerabilities discovered in macOS, including various CVEs that expose how remote code execution (RCE) within a…

  • Cloud Blog: Now run your custom code at the edge with the Application Load Balancers

    Source URL: https://cloud.google.com/blog/products/networking/service-extensions-plugins-for-application-load-balancers/ Source: Cloud Blog Title: Now run your custom code at the edge with the Application Load Balancers Feedly Summary: Application Load Balancers are essential for reliable web application delivery on Google Cloud. But while Google Cloud’s load balancers offer extensive customization, some situations demand even greater programmability.  We recently announced Service Extensions…

  • Slashdot: AI Bug Bounty Program Finds 34 Flaws in Open-Source Tools

    Source URL: https://it.slashdot.org/story/24/11/03/0123205/ai-bug-bounty-program-finds-34-flaws-in-open-source-tools?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: AI Bug Bounty Program Finds 34 Flaws in Open-Source Tools Feedly Summary: AI Summary and Description: Yes Summary: The report highlights the identification of numerous vulnerabilities in open-source AI and ML tools, particularly through Protect AI’s bug bounty program. It emphasizes the critical nature of security in AI development,…

  • Slashdot: Is AI-Driven 0-Day Detection Here?

    Source URL: https://it.slashdot.org/story/24/11/02/2150233/is-ai-driven-0-day-detection-here?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Is AI-Driven 0-Day Detection Here? Feedly Summary: AI Summary and Description: Yes Summary: This text discusses the advancements in AI-driven vulnerability detection, particularly focusing on the implementation of LLM-powered methodologies that have proven effective in identifying critical zero-day vulnerabilities. The approach combines deep program analysis with adversarial AI agents,…

  • Hacker News: Almost Secure (2011)

    Source URL: https://debugmo.de/2011/11/almost-secure/ Source: Hacker News Title: Almost Secure (2011) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text outlines seven classic security vulnerabilities that can affect embedded systems and devices, explaining how each can be exploited. It provides important insights for security professionals, especially those focusing on hardware and software security, by…

  • Hacker News: RCE Vulnerability in QBittorrent

    Source URL: https://sharpsec.run/rce-vulnerability-in-qbittorrent/ Source: Hacker News Title: RCE Vulnerability in QBittorrent Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text details significant security vulnerabilities present in the qBittorrent application, particularly involving SSL certificate validation and potential for remote code execution (RCE) through intentionally manipulated update processes. This information is highly relevant for professionals…