-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Aug 10, 2023


Fedora and Red Hat Leftovers

WordPress 6.3 “Lionel”



New SkidMap Malware Attacking Wide Range of Linux Distributions [Ed: Very misleading headline. This is not a Linux issue, it's a Redis issue.]


↺ New SkidMap Malware Attacking Wide Range of Linux Distributions


> According to recent reports, there have been instances of threat actors using malware called ''SkidMap'' to exploit vulnerable Redis systems.



ICS Patch Tuesday: Siemens Fixes 7 Vulnerabilities in Ruggedcom Products


↺ ICS Patch Tuesday: Siemens Fixes 7 Vulnerabilities in Ruggedcom Products


> ICS Patch Tuesday: Siemens releases a dozen advisories covering over 30 vulnerabilities, but Schneider Electric has only published one advisory.



Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns


↺ Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns


> Adobe rolls out a big batch of security updates to fix at least 30 Acrobat and Reader vulnerabilities affecting Windows and macOS users.



Rapid7 Announces Layoffs, Office Closings Under Restructuring Plan


↺ Rapid7 Announces Layoffs, Office Closings Under Restructuring Plan


> Restructuring plan will result in an 18% reduction in employee headcount and closing of some Rapid7 office locations.



Rapid7 to lay off 18% of staff amid new takeover reports


↺ Rapid7 to lay off 18% of staff amid new takeover reports


> Cybersecurity solutions provider Rapid7 Inc. announced alongside its quarterly earnings report today that it’s laying off staff amid reports that it has received a takeover bid from a private equity firm. In a filing with the U.S. Securities and Exchange Commission, Rapid7 said it’s laying off about 18% of its workforce...



Secure Your Software Supply Chain Through Backstage [Ed: Linux Foundation-sponsored Linux Foundation spam, written by Linux Foundation staff to promote fake security and promote Microsoft talking points]


↺ Secure Your Software Supply Chain Through Backstage


> An internal developer portal can help you consolidate and evolve your security strategy.



QSB-092: Buffer overrun in Linux netback driver (XSA-432)


↺ QSB-092: Buffer overrun in Linux netback driver (XSA-432)


> We have published Qubes Security Bulletin 092: Buffer overrun in Linux netback driver (XSA-432). The text of this QSB and its accompanying cryptographic signatures are reproduced below. For an explanation of this announcement and instructions for authenticating this QSB, please see the end of this announcement.


↺ Qubes Security Bulletin 092: Buffer overrun in Linux netback driver (XSA-432)


↺ Qubes Security Bulletin 092: Buffer overrun in Linux netback driver (XSA-432)



Microsoft Visual Studio Code flaw lets extensions steal passwords


↺ Microsoft Visual Studio Code flaw lets extensions steal passwords


> Microsoft’s Visual Studio Code (VS Code) code editor and development environment contains a flaw that allows malicious extensions to retrieve authentication tokens stored in Windows, Linux, and macOS credential managers.



Microsoft August Patch Tuesday sees less fixes in the pipeline


↺ Microsoft August Patch Tuesday sees less fixes in the pipeline


> Satnam Narang, senior staff research engineer at security firm Tenable, said fixes for 73 CVEs were included in this month's release, plus two advisories: six rated critical, 67 rated important, and two rated moderate.


> "For August, Microsoft addressed one vulnerability that was exploited in the wild as well as issued a defence-in-depth update for a vulnerability disclosed in the July 2023 Patch Tuesday," he said.


> "CVE-2023-38180, a denial of service vulnerability in .NET and Visual Studio, was exploited in the wild as a zero-day. Microsoft did not share specific details about its exploitation."



A Decade of Data Breaches: Some Things Never Change


↺ A Decade of Data Breaches: Some Things Never Change


> Why did Willie Sutton rob banks? “Because that’s where the money is,” he told a reporter. Fast forward to 2023, and data is the new currency, so it’s not surprising that bad guys are doing their best to steal it. While some techniques have changed, many aspects of data theft have remained the same over the years, according to the Verizon Data Breach Investigation Report.



Microsoft August 2023 Patch Tuesday, (Tue, Aug 8th)


↺ Microsoft August 2023 Patch Tuesday, (Tue, Aug 8th)


> This month we got patches for 88 vulnerabilities. Of these, 6 are critical, and 2 are already being exploited, according to Microsoft.



Patch Tuesday: Microsoft (Finally) Patches Exploited Office Zero-Days


↺ Patch Tuesday: Microsoft (Finally) Patches Exploited Office Zero-Days


> Patch Tuesday: A month after confirming active exploitation of Office code execution flaws, Microsoft has shipped patches for multiple affected products.



No sign of fix for critical Azure flaw on Patch Tuesday


↺ No sign of fix for critical Azure flaw on Patch Tuesday


> Microsoft has made no mention of a critical security flaw in its Azure cloud platform in its monthly issues of patches on Tuesday, though the company claimed earlier this month that it had completely fixed the issue.



Microsoft Office update breaks actively exploited RCE attack chain


↺ Microsoft Office update breaks actively exploited RCE attack chain


> Microsoft released a defense-in-depth update for Microsoft Office that prevents exploitation of a remote code execution (RCE) vulnerability tracked as CVE-2023-36884 that threat actors have already leveraged in attacks.



Microsoft August 2023 Patch Tuesday warns of 2 zero-days, 87 flaws


↺ Microsoft August 2023 Patch Tuesday warns of 2 zero-days, 87 flaws


> Today is Microsoft’s August 2023 Patch Tuesday, with security updates for 87 flaws, including two actively exploited and twenty-three remote code execution vulnerabilities.



Downfall: New Intel CPU Attack Exposing Sensitive Information


↺ Downfall: New Intel CPU Attack Exposing Sensitive Information


> Google researcher discloses the details of an Intel CPU attack method named Downfall that may be remotely exploitable.



Intel 'Downfall' Bug Steals Encryption Keys, Data From Years of CPUs


↺ Intel 'Downfall' Bug Steals Encryption Keys, Data From Years of CPUs


> A Google researcher has found a speculative execution vulnerability in several generations of Intel processors.



White House Holds First-Ever Summit on the Ransomware Crisis Plaguing the Nation’s Public Schools


↺ White House Holds First-Ever Summit on the Ransomware Crisis Plaguing the Nation’s Public Schools


> CISA will step up training for the K-12 sector and technology providers, including Amazon Web Services and Cloudflare, will offer grants and free software.



UK Think Tank Proposes Greater Ransomware Reporting From Cyberinsurance to Government


↺ UK Think Tank Proposes Greater Ransomware Reporting From Cyberinsurance to Government


> The Royal United Services Institute (RUSI) examined the relationship between cyberinsurance and ransomware, and proposes greater reporting from victims to government, enforced through insurance policies.



Horizon3 AI Raises $40 Million to Expand Automated Pentesting Platform


↺ Horizon3 AI Raises $40 Million to Expand Automated Pentesting Platform


> Horizon3.ai, a provider of autonomous security testing solutions, raised $40 million through a Series C funding round.



UK Electoral Commission discloses network breach after 10 months


↺ UK Electoral Commission discloses network breach after 10 months


> In a statement, the agency, an independent body which oversees elections and regulates political finance in the UK, said the attackers appeared to have first gained access to its systems in August 2021.


↺ a statement


> The attackers were able to gain access to the electoral registers and to enable permissibility checks on political donations, the agency said.


> The details in the system at the time of the attack includes names and addresses of those registered to vote between 2014 and 2022, as also names of registered overseas voters.


> {loadposition sam08}Details of those registered anonymously were not at risk, but the Commission’s email system was accessible to the attackers.


↺ a statement



Vulnerability disclosure in aviation


↺ Vulnerability disclosure in aviation


> We joined Boeing and United Airlines on a panel recently at the RSA Conference to talk about vulnerability disclosure in the aviation world.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sat Jun 1 07:48:48 2024