#security-vulnerabilities

[ follow ]
#cybersecurity

ONCD releases report on the adoption of memory-safe languages

Memory safe programming languages can reduce common vulnerabilities.
National Cyber Director calls for software and hardware creators to prioritize addressing memory safety issues.

US cyber officials issue urgent warning to millions of Apple users

Cyber officials urge Apple device updates for enhanced security.

Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel

A new technique can bypass Microsoft's Driver Signature Enforcement on patched Windows systems, allowing OS downgrade attacks with severe security implications.

Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

Multiple vulnerabilities in MMS protocol can severely impact industrial environments, allowing potential crashes and remote code execution.

Researchers pose as hackers, exposing security flaw that could open your hotel-room door

Hotel security flaw exposed by researchers posing as hackers
Lock manufacturer updating security to fix vulnerabilities

Even Great Companies Get Breached - Find Out Why and How to Stop It

Even the best companies can fall victim to cyberattacks due to unseen vulnerabilities.

ONCD releases report on the adoption of memory-safe languages

Memory safe programming languages can reduce common vulnerabilities.
National Cyber Director calls for software and hardware creators to prioritize addressing memory safety issues.

US cyber officials issue urgent warning to millions of Apple users

Cyber officials urge Apple device updates for enhanced security.

Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel

A new technique can bypass Microsoft's Driver Signature Enforcement on patched Windows systems, allowing OS downgrade attacks with severe security implications.

Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

Multiple vulnerabilities in MMS protocol can severely impact industrial environments, allowing potential crashes and remote code execution.

Researchers pose as hackers, exposing security flaw that could open your hotel-room door

Hotel security flaw exposed by researchers posing as hackers
Lock manufacturer updating security to fix vulnerabilities

Even Great Companies Get Breached - Find Out Why and How to Stop It

Even the best companies can fall victim to cyberattacks due to unseen vulnerabilities.
morecybersecurity
#patch-tuesday

Patch Tuesday update for November brings dozens of fixes

Microsoft's Patch Tuesday update includes 91 fixes, with urgent attention needed for two actively exploited zero-day vulnerabilities. Immediate patch installation is crucial.

For December's Patch Tuesday, 74 updates and a zero-day fix for Windows

OpenSSH service on Windows is failing to start, requiring manual intervention.
Windows Server 2008 faces update issues; Microsoft will fix soon.
Multiple critical patches released, including revisions for ongoing vulnerabilities.

For August, Patch Tuesday means patch now

Microsoft's August Patch Tuesday requires urgent action to patch six zero-day vulnerabilities across Windows and Office.
Focus on mitigating the risks associated with zero-day flaws is essential for user security.

January Patch Tuesday: New year, new Windows' bugs

Microsoft released 49 Windows security updates, including fixes for two critical-rated bugs.
There are four high-severity Chrome flaws in Microsoft Edge.

Patch Tuesday update for November brings dozens of fixes

Microsoft's Patch Tuesday update includes 91 fixes, with urgent attention needed for two actively exploited zero-day vulnerabilities. Immediate patch installation is crucial.

For December's Patch Tuesday, 74 updates and a zero-day fix for Windows

OpenSSH service on Windows is failing to start, requiring manual intervention.
Windows Server 2008 faces update issues; Microsoft will fix soon.
Multiple critical patches released, including revisions for ongoing vulnerabilities.

For August, Patch Tuesday means patch now

Microsoft's August Patch Tuesday requires urgent action to patch six zero-day vulnerabilities across Windows and Office.
Focus on mitigating the risks associated with zero-day flaws is essential for user security.

January Patch Tuesday: New year, new Windows' bugs

Microsoft released 49 Windows security updates, including fixes for two critical-rated bugs.
There are four high-severity Chrome flaws in Microsoft Edge.
morepatch-tuesday
#software-development

How to audit and validate AI-generated code output - LogRocket Blog

AI code should not be trusted blindly, as it may introduce security vulnerabilities and design flaws.
Implementing an auditing process for AI-generated code is crucial to ensure security and appropriate practices.

CodeRabbit raises $16M to bring AI to code reviews | TechCrunch

Automation of code reviews using AI can enhance efficiency but faces skepticism regarding effectiveness compared to human reviews.

Report Shines Spotlight on Open Source Software Security Challenges - DevOps.com

95% of security issues arise from open-source software dependencies, with over half lacking known fixes.

How an Effective AppSec Program Shifts Your Teams From Fixing to Building - DevOps.com

Effective application security supports innovation and efficiency in development teams.
Integrating security into the development process alleviates the burden of fixing vulnerabilities later.
Collaboration between DevOps and AppSec is essential to balance speed and security.

Zero trust: How the 'Jia Tan' hack complicated open-source software

Open-source software maintainers need community support and compensation to ensure the sustainability of vital projects.

Proactive Dependency Management: Reducing Risk and Improving Software Quality - DevOps.com

Proactive dependency management is essential for secure, high-quality software development.

How to audit and validate AI-generated code output - LogRocket Blog

AI code should not be trusted blindly, as it may introduce security vulnerabilities and design flaws.
Implementing an auditing process for AI-generated code is crucial to ensure security and appropriate practices.

CodeRabbit raises $16M to bring AI to code reviews | TechCrunch

Automation of code reviews using AI can enhance efficiency but faces skepticism regarding effectiveness compared to human reviews.

Report Shines Spotlight on Open Source Software Security Challenges - DevOps.com

95% of security issues arise from open-source software dependencies, with over half lacking known fixes.

How an Effective AppSec Program Shifts Your Teams From Fixing to Building - DevOps.com

Effective application security supports innovation and efficiency in development teams.
Integrating security into the development process alleviates the burden of fixing vulnerabilities later.
Collaboration between DevOps and AppSec is essential to balance speed and security.

Zero trust: How the 'Jia Tan' hack complicated open-source software

Open-source software maintainers need community support and compensation to ensure the sustainability of vital projects.

Proactive Dependency Management: Reducing Risk and Improving Software Quality - DevOps.com

Proactive dependency management is essential for secure, high-quality software development.
moresoftware-development
#video-doorbells

The company that sold cameras with 'terrible' security flaw has a new problem

The FCC is proposing over $700,000 in fines against Eken for security vulnerabilities and regulatory violations.

Eken fixes "terrible" video doorbell issue that could let someone spy on you

Eken Group issued firmware update for video doorbells with serious security vulnerabilities found by Consumer Reports.

The company that sold cameras with 'terrible' security flaw has a new problem

The FCC is proposing over $700,000 in fines against Eken for security vulnerabilities and regulatory violations.

Eken fixes "terrible" video doorbell issue that could let someone spy on you

Eken Group issued firmware update for video doorbells with serious security vulnerabilities found by Consumer Reports.
morevideo-doorbells

How to trick ChatGPT into writing exploit code using hex

GPT-4o can be exploited through hex encoding to generate malicious code, bypassing security measures designed to prevent harmful outputs.

Socket lands a fresh $40M to scan software for security flaws | TechCrunch

The software supply chain is currently at high risk, particularly with outdated open-source components leading to security vulnerabilities.

Deadly Hezbollah Strike on Army Base Shows Israel's Weakness Against Drones

Hezbollah's recent drone strike on Israel reveals significant gaps in the country's unmanned aircraft detection and defense capabilities.

Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks

Critical security vulnerabilities in Automatic Tank Gauge systems expose them to remote attacks, posing significant risks to critical infrastructure.
#cups

Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution

Recent CUPS vulnerabilities could allow remote command execution through malicious printer configurations on Linux systems.

Printing vulnerability affecting Linux distros raises alarm | Computer Weekly

The newly discovered vulnerabilities in Cups pose a significant security risk to numerous devices, potentially exposing them to remote code execution.

Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution

Recent CUPS vulnerabilities could allow remote command execution through malicious printer configurations on Linux systems.

Printing vulnerability affecting Linux distros raises alarm | Computer Weekly

The newly discovered vulnerabilities in Cups pose a significant security risk to numerous devices, potentially exposing them to remote code execution.
morecups

Why copilots and low-code apps portend a security nightmare

The boom in low-code platforms raises security risks, with many apps lacking proper security measures.
62% of apps built on these platforms have security vulnerabilities.
The rise of citizen developers can blur security protocols.

Feeld bugs allow message tampering, image, and video theft

Feeld dating app has critical security flaws that can expose private user data.

WhatsApp 'View Once' could be 'View Whenever' due to a flaw

WhatsApp's View Once feature is flawed and can easily be bypassed, undermining its intended privacy safeguards.

Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

Traccar GPS system has critical vulnerabilities allowing remote code execution via path traversal if guest registration is enabled, posing serious security risks.

Samsung Galaxy S21 FE finally gets Circle to Search

Circle to Search feature is now available on the Galaxy S21 FE via the August 2024 security update.

Google Pixel Devices Shipped with Vulnerable App, Leaving Millions at Risk

Google's Pixel devices shipped with potential security vulnerabilities due to dormant software pre-installed on devices since 2017.

Microsoft has a fix for preventing the next CrowdStrike fiasco, but is it a good one?

The global Windows outage underscores the risks inherent in relying on third-party security updates and the need for improved oversight.

Critical Flaw in Ivanti Virtual Traffic Manager Could Allow Rogue Admin Access

Ivanti released critical updates for CVE-2024-7593, a vulnerability in Virtual Traffic Manager, allowing admin authentication bypass.
Proactive measures include limiting access and prioritizing patch application to avoid exploitation.
#encryption

Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines

ATM security vulnerabilities showcasing potential exploitation despite being patched

Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks

Security vulnerabilities in Ewon Cosy+ could lead to root access, decryption of firmware files, and hijacking VPN sessions.

Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines

ATM security vulnerabilities showcasing potential exploitation despite being patched

Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks

Security vulnerabilities in Ewon Cosy+ could lead to root access, decryption of firmware files, and hijacking VPN sessions.
moreencryption

Ecovacs home robots can be hacked to spy on their owners, researchers say | TechCrunch

Malicious hackers can exploit vulnerabilities in Ecovacs robots to take control and spy on owners.

Free Software Evaluation Templates | ClickUp

Software evaluation templates are essential for structuring the evaluation processes of software solutions.

It's time to junk your Cisco SPA300 and SPA500 IP phones

Three critical flaws found in Cisco's Small Business IP phones will not be fixed as the devices are in the end-of-life process.

Researchers Bypass Windows Security Smart App Control And SmartScreen

Researchers identified weaknesses in Windows SmartScreen and Smart App Control, showing how attackers can bypass security measures.

Basic failures led to hack of Electoral Commission data on 40 million people | Computer Weekly

ICO reprimands Electoral Commission for basic security errors allowing Chinese hackers to access 40 million people's data.

Mitigating cyber risks in mergers and acquisitions

Acquisitions can pose significant security threats, as seen in cases like Dropbox, Marriott, and Yahoo, leading to data breaches, regulatory fines, and legal scrutiny.

Enhancing mobile app security with behaviour-based biometrics | Computer Weekly

Behaviour-based biometrics analyze unique user patterns for robust security.

How to Clear Your Browser's Cache, and Why You Should

Regularly clearing your browser cache can help prevent outdated content, performance issues, and potential security vulnerabilities.

VMware discloses flaws in Workstation and Fusion Pro products after making them free for personal use

VMware disclosed critical vulnerabilities in its hypervisor solutions, urging immediate patching to prevent exploitation by unauthorized actors.

How to protect your keyless car from theft

Using wireless key fobs and push-button starters in cars can make them vulnerable to relay attacks by thieves.

Connected cars' illegal data collection and use now on FTC's "radar"

Automakers are warned against excessive monetization of consumers' data from connected cars, stressing the importance of privacy safeguards.

Microsoft fixes exploited bugs, one used in QakBot attacks

Microsoft disclosed and patched 60 Windows CVEs, including two widely exploited ones: CVE-2024-30051 and CVE-2024-30040 with significant CVSS ratings.

No Country for No-Code: Are We Heading Towards a Wild West of Software Security? - DevOps.com

No-code platforms democratize development but can lead to security vulnerabilities.

Cross Site Scripting (XSS)

Cross Site Scripting (XSS) includes stored and unstored attacks, which can be devastating by executing malicious scripts on users' browsers.

Ubuntu 24.04 LTS, Noble Numbat, overhauls its installation and app experience

The absence of vulnerabilities to the XZ backdoor is viewed as a significant aspect of Ubuntu 24.04.

JetBrains fixes 26 'security problems,' offering no details

JetBrains urged users to upgrade due to 26 security issues in TeamCity.
JetBrains declined to disclose details for security fixes.

GitHub's latest AI tool that can automatically fix code vulnerabilities | TechCrunch

GitHub launches code scanning autofix feature for security vulnerabilities.
GitHub's new feature combines Copilot and CodeQL for real-time vulnerability remediation.

Researchers jimmy OpenAI's and Google's closed models

Researchers discovered an attack on AI services to reveal hidden parts of transformer models through API queries.
The attack can expose the embedding projection layer of black box models, costing from a few dollars to several thousand depending on model size.
#privacy-concerns

$30 doorbell cameras have multiple serious security flaws, says Consumer Reports

Budget video doorbell cameras from brands like Eken and Tuck have unsettling security vulnerabilities.
Consumer Reports found that these cameras transfer sensitive data without encryption and can easily be taken over through the mobile app.

Warning: "AI Girlfriends" Are Hoarding Your Personal Data

AI companion bots have concerning privacy pitfalls and murky data use policies.
AI soulmates and AI girlfriends/boyfriends are data-hoarding troves of privacy tripwires.

$30 doorbell cameras have multiple serious security flaws, says Consumer Reports

Budget video doorbell cameras from brands like Eken and Tuck have unsettling security vulnerabilities.
Consumer Reports found that these cameras transfer sensitive data without encryption and can easily be taken over through the mobile app.

Warning: "AI Girlfriends" Are Hoarding Your Personal Data

AI companion bots have concerning privacy pitfalls and murky data use policies.
AI soulmates and AI girlfriends/boyfriends are data-hoarding troves of privacy tripwires.
moreprivacy-concerns

How New Relic's Kubernetes Agents team decreased release time by 99% with GitHub workflows

New Relic automated their software agent release process for the Kubernetes integration, reducing deployment time from two weeks to one hour per week.
New Relic improved their response to security vulnerabilities by enabling code-scanning tools in their continuous integration pipeline, automatically patching code without human interaction within a week of a fix being available.

Sadiq Khan demands action from car manufacturers as keyless vehicle thefts soar in London

Sadiq Khan demands action from car manufacturers after spike in vehicle thefts in London
Between 60-65% of car thefts in the last year were keyless car thefts

How one city took on rising car thefts and brought the numbers down

St. Paul, Minnesota has seen a dramatic decrease in car thefts due to a focus on prevention and youth intervention.
Car thefts nationwide increased after a viral TikTok video exposed security vulnerabilities in certain models of Kia and Hyundai cars.

Custom GPTs from OpenAI May Leak Sensitive Information

OpenAI's GPT models are susceptible to prompt injection attacks, which can expose sensitive information.
Customizable GPT models need robust security frameworks to address potential vulnerabilities.

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS, and macOS.
The vulnerabilities were discovered by Google's Threat Analysis Group.
#Apple

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS, and macOS.
The vulnerabilities were discovered by Google's Threat Analysis Group.

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS, and macOS.
The vulnerabilities were discovered by Google's Threat Analysis Group.

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS, and macOS.
The vulnerabilities were discovered by Google's Threat Analysis Group.

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS, and macOS.
The vulnerabilities were discovered by Google's Threat Analysis Group.
moreApple
[ Load more ]