Tag: Exploitation
-
The Register: Moscow-adjacent GoldenJackal gang strikes air-gapped systems with custom malware
Source URL: https://www.theregister.com/2024/10/09/goldenjackal_custom_malware/ Source: The Register Title: Moscow-adjacent GoldenJackal gang strikes air-gapped systems with custom malware Feedly Summary: USB sticks help, but it’s unclear how tools that suck malware from them are delivered A cyberespionage APT crew named GoldenJackal hacked air-gapped PCs belonging to government and diplomatic entities at least twice using two sets of…
-
Cisco Talos Blog: Vulnerability in popular PDF reader could lead to arbitrary code execution; Multiple issues in GNOME project
Source URL: https://blog.talosintelligence.com/vulnerability-roundup-foxit-gnome-oct-9-2024/ Source: Cisco Talos Blog Title: Vulnerability in popular PDF reader could lead to arbitrary code execution; Multiple issues in GNOME project Feedly Summary: Talos also discovered three vulnerabilities in Veertu’s Anka Build, a suite of software designed to test macOS or iOS applications in CI/CD environments. AI Summary and Description: Yes Summary:…
-
Alerts: CISA Adds Three Known Exploited Vulnerabilities to Catalog
Source URL: https://www.cisa.gov/news-events/alerts/2024/10/09/cisa-adds-three-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Three Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-23113 Fortinet Multiple Products Format String Vulnerability CVE-2024-9379 Ivanti Cloud Services Appliance (CSA) SQL Injection Vulnerability CVE-2024-9380 Ivanti Cloud Services Appliance (CSA) OS Command Injection…
-
Krebs on Security: Patch Tuesday, October 2024 Edition
Source URL: https://krebsonsecurity.com/2024/10/patch-tuesday-october-2024-edition/ Source: Krebs on Security Title: Patch Tuesday, October 2024 Edition Feedly Summary: Microsoft today released security updates to fix at least 117 security holes in Windows computers and other software, including two vulnerabilities that are already seeing active attacks. Also, Adobe plugged 52 security holes across a range of products, and Apple…