Tag: exploit

  • The Register: Windows Themes zero-day bug exposes users to NTLM credential theft

    Source URL: https://www.theregister.com/2024/10/30/zeroday_windows_themes/ Source: The Register Title: Windows Themes zero-day bug exposes users to NTLM credential theft Feedly Summary: Plus a free micropatch until Redmond fixes the flaw There’s a Windows Themes spoofing zero-day bug on the loose that allows attackers to steal people’s NTLM credentials.… AI Summary and Description: Yes Summary: The text discusses…

  • Alerts: Fortinet Updates Guidance and Indicators of Compromise following FortiManager Vulnerability Exploitation

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/30/fortinet-updates-guidance-and-indicators-compromise-following-fortimanager-vulnerability Source: Alerts Title: Fortinet Updates Guidance and Indicators of Compromise following FortiManager Vulnerability Exploitation Feedly Summary: Fortinet has updated their security advisory addressing a critical FortiManager vulnerability (CVE-2024-47575) to include additional workarounds and indicators of compromise (IOCs). A remote, unauthenticated cyber threat actor could exploit this vulnerability to gain access to sensitive…

  • Cloud Blog: Cloud CISO Perspectives: 10 ways to make cyber-physical systems more resilient

    Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-10-ways-to-make-cyber-physical-systems-more-resilient/ Source: Cloud Blog Title: Cloud CISO Perspectives: 10 ways to make cyber-physical systems more resilient Feedly Summary: Welcome to the second Cloud CISO Perspectives for October 2024. Today, Anton Chuvakin, senior security consultant for our Office of the CISO, offers 10 leading indicators to improve cyber-physical systems, guided by our analysis of…

  • The Register: How to jailbreak ChatGPT and trick the AI into writing exploit code using hex encoding

    Source URL: https://www.theregister.com/2024/10/29/chatgpt_hex_encoded_jailbreak/ Source: The Register Title: How to jailbreak ChatGPT and trick the AI into writing exploit code using hex encoding Feedly Summary: ‘It was like watching a robot going rogue’ says researcher OpenAI’s language model GPT-4o can be tricked into writing exploit code by encoding the malicious instructions in hexadecimal, which allows an…

  • Slashdot: Local Privilege Escalation Vulnerability Affecting X.Org Server For 18 Years

    Source URL: https://it.slashdot.org/story/24/10/29/2029233/local-privilege-escalation-vulnerability-affecting-xorg-server-for-18-years?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Local Privilege Escalation Vulnerability Affecting X.Org Server For 18 Years Feedly Summary: AI Summary and Description: Yes Summary: The text discusses CVE-2024-9632, a security vulnerability in the X.Org Server that has persisted for 18 years. This flaw could allow for local privilege escalation and is critical for professionals involved…

  • Alerts: JCDC’s Industry-Government Collaboration Speeds Mitigation of CrowdStrike IT Outage

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/29/jcdcs-industry-government-collaboration-speeds-mitigation-crowdstrike-it-outage Source: Alerts Title: JCDC’s Industry-Government Collaboration Speeds Mitigation of CrowdStrike IT Outage Feedly Summary: CISA, through the Joint Cyber Defense Collaborative (JCDC), enabled swift, coordinated response and information sharing in the wake of a significant IT outage caused by a CrowdStrike software update. This outage, which impacted government, critical infrastructure, and industry…

  • OpenAI : Delivering high-performance customer support

    Source URL: https://openai.com/index/decagon Source: OpenAI Title: Delivering high-performance customer support Feedly Summary: Decagon and OpenAI deliver high-performance, fully automated customer support at scale AI Summary and Description: Yes Summary: The text discusses a partnership between Decagon and OpenAI to provide high-performance, fully automated customer support. This collaboration highlights advancements in AI technology and its application…

  • Hacker News: Ancient Monkey: Pwning a 17-Year-Old Version of SpiderMonkey

    Source URL: https://blog.pspaul.de/posts/ancient-monkey-pwning-a-17-year-old-version-of-spidermonkey/ Source: Hacker News Title: Ancient Monkey: Pwning a 17-Year-Old Version of SpiderMonkey Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a significant vulnerability found in the Zscaler enterprise VPN solution, particularly linked to the pacparser library and its use of an outdated version of the SpiderMonkey JavaScript engine.…

  • Alerts: CISA Releases Three Industrial Control Systems Advisories

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/29/cisa-releases-three-industrial-control-systems-advisories Source: Alerts Title: CISA Releases Three Industrial Control Systems Advisories Feedly Summary: CISA released three Industrial Control Systems (ICS) advisories on October 29, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-303-01 Siemens InterMesh Subscriber Devices ICSA-24-303-02 Solar-Log Base 15 ICSA-24-303-03 Delta Electronics InfraSuite Device…

  • The Register: Admins better Spring into action over latest critical open source vuln

    Source URL: https://www.theregister.com/2024/10/29/admins_spring_into_action_over/ Source: The Register Title: Admins better Spring into action over latest critical open source vuln Feedly Summary: Patch up: The Spring framework dominates the Java ecosystem If you’re running an application built using the Spring development framework, now is a good time to check it’s fully updated – a new, critical-severity vulnerability…