Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers – OfficialSarkar

Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers – OfficialSarkar

Aug 09, 2024Ravie LakshmananCloud Security / Data Protection Cybersecurity researchers have discovered multiple critical flaws in Amazon Web Services (AWS) offerings that, if successfully exploited, could result in serious consequences. “The impact of these vulnerabilities range between remote code execution (RCE), full-service user takeover (which might provide powerful administrative access), manipulation of AI modules, exposing…

Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE – OfficialSarkar

Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE – OfficialSarkar

Aug 09, 2024Ravie LakshmananVulnerability / Network Security Microsoft on Thursday disclosed four medium-severity security flaws in the open-source OpenVPN software that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE). “This attack chain could enable attackers to gain full control over targeted endpoints, potentially resulting in data breaches, system compromise,…

New Flaws in Sonos Smart Speakers Allow Hackers to Eavesdrop on Users – OfficialSarkar

New Flaws in Sonos Smart Speakers Allow Hackers to Eavesdrop on Users – OfficialSarkar

Aug 09, 2024Ravie LakshmananIoT Security / Wireless Security Cybersecurity researchers have uncovered weaknesses in Sonos smart speakers that could be exploited by malicious actors to clandestinely eavesdrop on users. The vulnerabilities “led to an entire break in the security of Sonos’s secure boot process across a wide range of devices and remotely being able to…

DOJ Charges Nashville Man for Helping North Koreans Get U.S. Tech Jobs – OfficialSarkar

DOJ Charges Nashville Man for Helping North Koreans Get U.S. Tech Jobs – OfficialSarkar

Aug 09, 2024Ravie LakshmananNational Security / Identity Theft The U.S. Department of Justice (DoJ) on Thursday charged a 38-year-old individual from Nashville, Tennessee, for allegedly running a “laptop farm” to help get North Koreans remote jobs with American and British companies. Matthew Isaac Knoot is charged with conspiracy to cause damage to protected computers, conspiracy…

CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature – OfficialSarkar

CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature – OfficialSarkar

Aug 09, 2024Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed that threat actors are abusing the legacy Cisco Smart Install (SMI) feature with the aim of accessing sensitive data. The agency said it has seen adversaries “acquire system configuration files by leveraging available protocols or software on devices,…

University Professors Targeted by North Korean Cyber Espionage Group – OfficialSarkar

University Professors Targeted by North Korean Cyber Espionage Group – OfficialSarkar

Aug 08, 2024Ravie LakshmananCyber Attack / Cyber Espionage The North Korea-linked threat actor known as Kimsuky has been linked to a new set of attacks targeting university staff, researchers, and professors for intelligence gathering purposes. Cybersecurity firm Resilience said it identified the activity in late July 2024 after it observed an operation security (OPSEC) error…

18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices – OfficialSarkar

18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices – OfficialSarkar

Aug 08, 2024Ravie LakshmananVulnerability / Browser Security Cybersecurity researchers have discovered a new “0.0.0.0 Day” impacting all major web browsers that malicious websites could take advantage of to breach local networks. The critical vulnerability “exposes a fundamental flaw in how browsers handle network requests, potentially granting malicious actors access to sensitive services running on local…

New Phishing Scam Uses Google Drawings and WhatsApp Shortened Links – OfficialSarkar

New Phishing Scam Uses Google Drawings and WhatsApp Shortened Links – OfficialSarkar

Aug 08, 2024Ravie LakshmananNetwork Security / Cloud Security Cybersecurity researchers have discovered a novel phishing campaign that leverages Google Drawings and shortened links generated via WhatsApp to evade detection and trick users into clicking on bogus links designed to steal sensitive information. “The attackers chose a group of the best-known websites in computing to craft…

One (Very Important) Part of a Complete CTEM Framework – OfficialSarkar

One (Very Important) Part of a Complete CTEM Framework – OfficialSarkar

Aug 08, 2024The Hacker NewsCyber Threat Management The last few years have seen more than a few new categories of security solutions arise in hopes of stemming a never-ending tidal wave of risks. One of these categories is Automated Security Validation (ASV), which provides the attacker’s perspective of exposures and equips security teams to continuously…

Windows Downgrade Attack Risks Exposing Patched Systems to Old Vulnerabilities – OfficialSarkar

Windows Downgrade Attack Risks Exposing Patched Systems to Old Vulnerabilities – OfficialSarkar

Aug 08, 2024Ravie LakshmananWindows Security / Vulnerability Microsoft said it is developing security updates to address two loopholes that it said could be abused to stage downgrade attacks against the Windows update architecture and replace current versions of the Windows files with older versions. The vulnerabilities are listed below – CVE-2024-38202 (CVSS score: 7.3) –…