Tag: exploits

  • The Register: Ongoing typosquatting campaign impersonates hundreds of popular npm packages

    Source URL: https://www.theregister.com/2024/11/05/typosquatting_npm_campaign/ Source: The Register Title: Ongoing typosquatting campaign impersonates hundreds of popular npm packages Feedly Summary: Puppeteer or Pupeter? One of them will snoop around on your machine and steal your credentials An ongoing typosquatting campaign is targeting developers via hundreds of popular JavaScript libraries, whose weekly downloads number in the tens of…

  • Alerts: CISA Adds Two Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/11/04/cisa-adds-two-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Two Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-8957 PTZOptics PT30X-SDI/NDI Cameras OS Command Injection Vulnerability CVE-2024-8956 PTZOptics PT30X-SDI/NDI Cameras Authentication Bypass Vulnerability These types of vulnerabilities are frequent attack vectors…

  • Slashdot: AI Bug Bounty Program Finds 34 Flaws in Open-Source Tools

    Source URL: https://it.slashdot.org/story/24/11/03/0123205/ai-bug-bounty-program-finds-34-flaws-in-open-source-tools?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: AI Bug Bounty Program Finds 34 Flaws in Open-Source Tools Feedly Summary: AI Summary and Description: Yes Summary: The report highlights the identification of numerous vulnerabilities in open-source AI and ML tools, particularly through Protect AI’s bug bounty program. It emphasizes the critical nature of security in AI development,…

  • Hacker News: Okta – Username Above 52 Characters Security Advisory

    Source URL: https://trust.okta.com/security-advisories/okta-ad-ldap-delegated-authentication-username/ Source: Hacker News Title: Okta – Username Above 52 Characters Security Advisory Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a security vulnerability identified in Okta’s authentication process involving the DelAuth mechanism and the Bcrypt hashing algorithm. The significance lies in its implications for user authentication security and…

  • Simon Willison’s Weblog: From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code

    Source URL: https://simonwillison.net/2024/Nov/1/from-naptime-to-big-sleep/#atom-everything Source: Simon Willison’s Weblog Title: From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code Feedly Summary: From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code Google’s Project Zero security team used a system based around Gemini 1.5 Pro to find…

  • Alerts: Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/31/foreign-threat-actor-conducting-large-scale-spear-phishing-campaign-rdp-attachments Source: Alerts Title: Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments Feedly Summary: CISA has received multiple reports of a large-scale spear-phishing campaign targeting organizations in several sectors, including government and information technology (IT). The foreign threat actor, often posing as a trusted entity, is sending spear-phishing emails containing malicious…

  • Cisco Talos Blog: NVIDIA shader out-of-bounds and eleven LevelOne router vulnerabilities

    Source URL: https://blog.talosintelligence.com/nvidia-shader-out-of-bounds-and-level1-2/ Source: Cisco Talos Blog Title: NVIDIA shader out-of-bounds and eleven LevelOne router vulnerabilities Feedly Summary: Cisco Talos’ Vulnerability Research team recently discovered five Nvidia out-of-bounds access vulnerabilities in shader processing, as well as eleven LevelOne router vulnerabilities spanning a range of possible exploits.For Snort coverage that can detect the exploitation of these…

  • Alerts: CISA Releases Four Industrial Control Systems Advisories

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/31/cisa-releases-four-industrial-control-systems-advisories Source: Alerts Title: CISA Releases Four Industrial Control Systems Advisories Feedly Summary: CISA released four Industrial Control Systems (ICS) advisories on October 31, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-305-01 Rockwell Automation FactoryTalk ThinManager ICSA-24-030-02 Mitsubishi Electric FA Engineering Software Products (Update A)…

  • The Register: How to jailbreak ChatGPT and trick the AI into writing exploit code using hex encoding

    Source URL: https://www.theregister.com/2024/10/29/chatgpt_hex_encoded_jailbreak/ Source: The Register Title: How to jailbreak ChatGPT and trick the AI into writing exploit code using hex encoding Feedly Summary: ‘It was like watching a robot going rogue’ says researcher OpenAI’s language model GPT-4o can be tricked into writing exploit code by encoding the malicious instructions in hexadecimal, which allows an…

  • Alerts: CISA Releases Three Industrial Control Systems Advisories

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/29/cisa-releases-three-industrial-control-systems-advisories Source: Alerts Title: CISA Releases Three Industrial Control Systems Advisories Feedly Summary: CISA released three Industrial Control Systems (ICS) advisories on October 29, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-303-01 Siemens InterMesh Subscriber Devices ICSA-24-303-02 Solar-Log Base 15 ICSA-24-303-03 Delta Electronics InfraSuite Device…