Tag: code execution

  • Hacker News: Gemini 2.0 is now available to everyone

    Source URL: https://blog.google/technology/google-deepmind/gemini-model-updates-february-2025/ Source: Hacker News Title: Gemini 2.0 is now available to everyone Feedly Summary: Comments AI Summary and Description: Yes Summary: The text outlines the launch and features of the Gemini 2.0 series of AI models by Google, highlighting advancements in performance, multimodal capabilities, and safety measures. It introduces several models tailored for…

  • The Register: Poisoned Go programming language package lay undetected for 3 years

    Source URL: https://www.theregister.com/2025/02/04/golang_supply_chain_attack/ Source: The Register Title: Poisoned Go programming language package lay undetected for 3 years Feedly Summary: Researcher says ecosystem’s auto-caching is a net positive but presents exploitable quirks A security researcher says a backdoor masquerading as a legitimate Go programming language package used by thousands of organizations was left undetected for years.……

  • The Register: Google patches odd Android kernel security bug amid signs of targeted exploitation

    Source URL: https://www.theregister.com/2025/02/04/google_android_patch_netgear/ Source: The Register Title: Google patches odd Android kernel security bug amid signs of targeted exploitation Feedly Summary: Also, Netgear fixes critical router, access point vulnerabilities Google has released its February Android security updates, including a fix for a high-severity kernel-level vulnerability, which is suspected to be in use by targeted exploits.……

  • Cloud Blog: CVE-2023-6080: A Case Study on Third-Party Installer Abuse

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/cve-2023-6080-third-party-installer-abuse/ Source: Cloud Blog Title: CVE-2023-6080: A Case Study on Third-Party Installer Abuse Feedly Summary: Written By: Jacob Paullus, Daniel McNamara, Jake Rawlins, Steven Karschnia Executive Summary Mandiant exploited flaws in the Microsoft Software Installer (MSI) repair action of Lakeside Software’s SysTrack installer to obtain arbitrary code execution. An attacker with low-privilege access…

  • Alerts: CISA Releases Fact Sheet Detailing Embedded Backdoor Function of Contec CMS8000 Firmware

    Source URL: https://www.cisa.gov/news-events/alerts/2025/01/30/cisa-releases-fact-sheet-detailing-embedded-backdoor-function-contec-cms8000-firmware Source: Alerts Title: CISA Releases Fact Sheet Detailing Embedded Backdoor Function of Contec CMS8000 Firmware Feedly Summary: CISA released a fact sheet, Contec CMS8000 Contains a Backdoor, detailing an analysis of three firmware package versions of the Contec CMS8000, a patient monitor used by the U.S. Healthcare and Public Health (HPH) sector.…

  • Cisco Talos Blog: Whatsup Gold, Observium and Offis vulnerabilities

    Source URL: https://blog.talosintelligence.com/whatsup-gold-observium-offis-vulnerabilities/ Source: Cisco Talos Blog Title: Whatsup Gold, Observium and Offis vulnerabilities Feedly Summary: Cisco Talos’ Vulnerability Research team recently disclosed three vulnerabilities in Observium, three vulnerabilities in Offis, and four vulnerabilities in Whatsup Gold.   These vulnerabilities exist in Observium, a network observation and monitoring system; Offis DCMTK, a collection of libraries and applications…