Tag: hijacking

  • Microsoft Security Blog: Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/ Source: Microsoft Security Blog Title: Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage Feedly Summary: Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indian Army targets. The post Frequent freeloader part…

  • The Register: Russian spies may have moved in next door to target your network

    Source URL: https://www.theregister.com/2024/11/25/infosec_news_in_brief/ Source: The Register Title: Russian spies may have moved in next door to target your network Feedly Summary: Plus: Microsoft seizes phishing domains; Helldown finds new targets; Illegal streaming with Jupyter, and more Infosec in brief Not to make you paranoid, but that business across the street could, under certain conditions, serve…

  • Wired: Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack

    Source URL: https://www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/ Source: Wired Title: Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack Feedly Summary: In a first, Russia’s APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street. AI Summary and Description: Yes…

  • Alerts: Fortinet Releases Security Updates for Multiple Products

    Source URL: https://www.cisa.gov/news-events/alerts/2024/11/12/fortinet-releases-security-updates-multiple-products Source: Alerts Title: Fortinet Releases Security Updates for Multiple Products Feedly Summary: Fortinet has released security updates to address vulnerabilities in multiple products, including FortiOS. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the following advisories…

  • Hacker News: RCE Vulnerability in QBittorrent

    Source URL: https://sharpsec.run/rce-vulnerability-in-qbittorrent/ Source: Hacker News Title: RCE Vulnerability in QBittorrent Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text details significant security vulnerabilities present in the qBittorrent application, particularly involving SSL certificate validation and potential for remote code execution (RCE) through intentionally manipulated update processes. This information is highly relevant for professionals…

  • Slashdot: Inside a Firewall Vendor’s 5-Year War With the Chinese Hackers Hijacking Its Devices

    Source URL: https://it.slashdot.org/story/24/11/01/088213/inside-a-firewall-vendors-5-year-war-with-the-chinese-hackers-hijacking-its-devices?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Inside a Firewall Vendor’s 5-Year War With the Chinese Hackers Hijacking Its Devices Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant cybersecurity battle undertaken by Sophos against Chinese hackers targeting firewall products. This situation has implications for information security, particularly concerning the risks associated…

  • Wired: Inside Sophos’ 5-Year War With the Chinese Hackers Hijacking Its Devices

    Source URL: https://www.wired.com/story/sophos-chengdu-china-five-year-hacker-war/ Source: Wired Title: Inside Sophos’ 5-Year War With the Chinese Hackers Hijacking Its Devices Feedly Summary: Sophos went so far as to plant surveillance “implants” on its own devices to catch the hackers at work—and in doing so, revealed a glimpse into China’s R&D pipeline of intrusion techniques. AI Summary and Description:…

  • The Register: AWS Cloud Development Kit flaw exposed accounts to full takeover

    Source URL: https://www.theregister.com/2024/10/24/aws_cloud_development_kit_flaw/ Source: The Register Title: AWS Cloud Development Kit flaw exposed accounts to full takeover Feedly Summary: Remember Bucket Monopoly? Yeah, there’s more Amazon Web Services has fixed a flaw in its open source Cloud Development Kit (CDK) that, under the right conditions, could allow an attacker to completely hijack an account.… AI…

  • CSA: Simulate Session Hijacking in Your SaaS Applications

    Source URL: https://appomni.com/ao-labs/how-to-simulate-session-hijacking-in-your-saas-applications/ Source: CSA Title: Simulate Session Hijacking in Your SaaS Applications Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses session hijacking, focusing on detection challenges and methods to simulate hijacking in a lab environment. It provides insight into the importance of server-side audit logs for detecting compromised sessions, highlighting the…