-- Leo's gemini proxy
-- Connecting to gemini.tuxmachines.org:1965...
-- Connected
-- Sending request
-- Meta line: 20 text/gemini;lang=en-GB
Tux Machines
Posted by Roy Schestowitz on Aug 10, 2023
> According to recent reports, there have been instances of threat actors using malware called ''SkidMap'' to exploit vulnerable Redis systems.
> ICS Patch Tuesday: Siemens releases a dozen advisories covering over 30 vulnerabilities, but Schneider Electric has only published one advisory.
> Adobe rolls out a big batch of security updates to fix at least 30 Acrobat and Reader vulnerabilities affecting Windows and macOS users.
> Restructuring plan will result in an 18% reduction in employee headcount and closing of some Rapid7 office locations.
> Cybersecurity solutions provider Rapid7 Inc. announced alongside its quarterly earnings report today that it’s laying off staff amid reports that it has received a takeover bid from a private equity firm. In a filing with the U.S. Securities and Exchange Commission, Rapid7 said it’s laying off about 18% of its workforce...
> An internal developer portal can help you consolidate and evolve your security strategy.
> We have published Qubes Security Bulletin 092: Buffer overrun in Linux netback driver (XSA-432). The text of this QSB and its accompanying cryptographic signatures are reproduced below. For an explanation of this announcement and instructions for authenticating this QSB, please see the end of this announcement.
> Microsoft’s Visual Studio Code (VS Code) code editor and development environment contains a flaw that allows malicious extensions to retrieve authentication tokens stored in Windows, Linux, and macOS credential managers.
> Satnam Narang, senior staff research engineer at security firm Tenable, said fixes for 73 CVEs were included in this month's release, plus two advisories: six rated critical, 67 rated important, and two rated moderate.
> "For August, Microsoft addressed one vulnerability that was exploited in the wild as well as issued a defence-in-depth update for a vulnerability disclosed in the July 2023 Patch Tuesday," he said.
> "CVE-2023-38180, a denial of service vulnerability in .NET and Visual Studio, was exploited in the wild as a zero-day. Microsoft did not share specific details about its exploitation."
> Why did Willie Sutton rob banks? “Because that’s where the money is,” he told a reporter. Fast forward to 2023, and data is the new currency, so it’s not surprising that bad guys are doing their best to steal it. While some techniques have changed, many aspects of data theft have remained the same over the years, according to the Verizon Data Breach Investigation Report.
> This month we got patches for 88 vulnerabilities. Of these, 6 are critical, and 2 are already being exploited, according to Microsoft.
> Patch Tuesday: A month after confirming active exploitation of Office code execution flaws, Microsoft has shipped patches for multiple affected products.
> Microsoft has made no mention of a critical security flaw in its Azure cloud platform in its monthly issues of patches on Tuesday, though the company claimed earlier this month that it had completely fixed the issue.
> Microsoft released a defense-in-depth update for Microsoft Office that prevents exploitation of a remote code execution (RCE) vulnerability tracked as CVE-2023-36884 that threat actors have already leveraged in attacks.
> Today is Microsoft’s August 2023 Patch Tuesday, with security updates for 87 flaws, including two actively exploited and twenty-three remote code execution vulnerabilities.
> Google researcher discloses the details of an Intel CPU attack method named Downfall that may be remotely exploitable.
> A Google researcher has found a speculative execution vulnerability in several generations of Intel processors.
> CISA will step up training for the K-12 sector and technology providers, including Amazon Web Services and Cloudflare, will offer grants and free software.
> The Royal United Services Institute (RUSI) examined the relationship between cyberinsurance and ransomware, and proposes greater reporting from victims to government, enforced through insurance policies.
> Horizon3.ai, a provider of autonomous security testing solutions, raised $40 million through a Series C funding round.
> In a statement, the agency, an independent body which oversees elections and regulates political finance in the UK, said the attackers appeared to have first gained access to its systems in August 2021.
> The attackers were able to gain access to the electoral registers and to enable permissibility checks on political donations, the agency said.
> The details in the system at the time of the attack includes names and addresses of those registered to vote between 2014 and 2022, as also names of registered overseas voters.
> {loadposition sam08}Details of those registered anonymously were not at risk, but the Commission’s email system was accessible to the attackers.
> We joined Boeing and United Airlines on a panel recently at the RSA Conference to talk about vulnerability disclosure in the aviation world.
-- Response ended
-- Page fetched on Sat Jun 1 07:48:48 2024