Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover

April 30, 2024 at 01:33PM Three critical-severity vulnerabilities in the Judge0 open source service enable sandbox escapes and complete host machine takeovers. The flaws impact versions before 1.13.1 and can lead to code execution outside the sandbox, privilege escalation, and full system access. While version 1.13.1 addresses the issues, the potential for exploitation via other … Read more

US House approves FISA renewal – warrantless surveillance and all

April 14, 2024 at 10:04PM US Congress nearly killed a reauthorization of FISA Section 702 due to concerns about warrantless surveillance of Americans. Republican holdouts and Democrats blocked the bill, demanding a warrant amendment. The amendment failed, allowing continued warrantless surveillance. Nexperia, a Dutch chipmaker, suffered an IT attack. Critical vulnerabilities were disclosed, including a … Read more

Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update

March 12, 2024 at 06:13PM Microsoft’s March Patch Tuesday update addresses 60 unique CVEs, with only two rated as “critical”. Both affect Windows Hyper-V: CVE-2024-21407, a remote code execution (RCE) bug, and CVE-2024-21408, a denial-of-service (DoS) vulnerability. The update also includes fixes for 18 RCE and two dozen elevation-of-privilege vulnerabilities, requiring immediate attention. Notably, this … Read more

SAP’s First Patches of 2024 Resolve Critical Vulnerabilities

January 10, 2024 at 08:33AM SAP has issued patches for critical vulnerabilities in Business Application Studio, Web IDE, and Edge Integration Cell, marking its first patches of 2024. The post on SecurityWeek highlights the significance of these updates in addressing potential security threats. Based on the meeting notes, it appears that SAP has released patches … Read more

Iranian cyberspies target US defense orgs with a brand new backdoor

December 23, 2023 at 07:54AM Iranian cyberspies, identified as Peach Sandstrom by Microsoft, are targeting defense industrial base organizations with a new backdoor called FalseFont. APT33, which Mandiant tracks as Iran-backed, engages in strategic cyberespionage against organizations in the US, Saudi Arabia, and South Korea. Additionally, 443 online shops have been compromised by cyber crooks … Read more

ICS Patch Tuesday: Electromagnetic Fault Injection, Critical Redis Vulnerability

December 12, 2023 at 08:48AM Siemens and Schneider Electric have published their Patch Tuesday advisories for December 2023, addressing dozens of vulnerabilities. Siemens’ advisories cover over 30 vulnerabilities, including critical flaws, and Schneider Electric has released advisories about critical, high, and medium-severity vulnerabilities affecting their products. A total of 90 vulnerabilities have been addressed by … Read more

EU lawmakers finalize cyber security rules that panicked open source devs

December 4, 2023 at 01:08AM The EU’s Cyber Resilience Act (CRA), which imposes cyber security requirements on hardware and software products, is poised for final approval. Open source software is exempt under new rules. Manufacturers have three years to comply or face fines. Meanwhile, critical vulnerabilities in various software were patched and a US federal … Read more

Cactus ransomware exploiting Qlik Sense flaws to breach networks

November 30, 2023 at 02:06PM Cactus ransomware targets Qlik Sense analytics platform vulnerabilities for network access, exploiting unpatched systems to gain control, download tools, and deploy ransomware. Updates have been released to address critical flaws; users are advised to install designated patches. Arctic Wolf reports Cactus uses advanced techniques for persistence, lateral movement, and data … Read more

Qlik Sense Vulnerabilities Exploited in Ransomware Attacks

November 30, 2023 at 09:42AM Arctic Wolf has linked three critical vulnerabilities in Qlik’s analytics products to ransomware attacks, notably Cactus ransomware. The vulnerabilities, reported by Praetorian and patched by Qlik, allow remote code execution and admin access, with over 17,000 internet-exposed instances. The same threat actor seems responsible for multiple intrusions. Meeting Takeaways: 1. … Read more