Security
Headlines
HeadlinesLatestCVEs

Tag

#auth

FBI Director Wray Issues Dire Warning on China's Cybersecurity Threat

Chinese actors are ready and poised to do "devastating" damage to key US infrastructure services if needed, he said.

DARKReading
#vulnerability#web#microsoft#intel#auth#zero_day
UNDP, City of Copenhagen Targeted in Data-Extortion Cyberattack

A ransomware gang claimed responsibility for the attack, though it is unknown if a ransom was demanded or paid.

Multiple LastPass Users Lose Master Passwords to Ultra-Convincing Scam

CryptoChameleon attackers trade quantity for quality, dedicating time and resources to trick even the most diligent user into handing over their high-value credentials.

Rethinking How You Work With Detection and Response Metrics

Airbnb's Allyn Stott recommends adding the Human Maturity Model (HMM) and the SABRE framework to complement MITRE ATT&CK to improve security metrics analysis.

GHSA-23q2-5gf8-gjpp: Enabling Authentication does not close all logged in socket connections immediately

### Summary This is basically [GHSA-88j4-pcx8-q4q](https://github.com/louislam/uptime-kuma/security/advisories/GHSA-88j4-pcx8-q4q3) but instead of changing passwords, when enabling authentication. ### PoC - Open Uptime Kuma with authentication disabled - Enable authentication using another window - Access the platform using the previously logged-in window - Note that access (read-write) remains despite the enabled authentication - Expected behaviour: - After enabling authentication, all previously connected sessions should be invalidated, requiring users to log in. - Actual behaviour: - The system retains sessions and never logs out users unless explicitly done by clicking logout or refreshing the page. ### Impact See [GHSA-g9v2-wqcj-j99g](https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g) and [GHSA-88j4-pcx8-q4q](https://github.com/louislam/uptime-kuma/security/advisories/GHSA-88j4-pcx8-q4q3) TBH this is quite a niche edge case, so I don't know if ...

IT and Cybersecurity Jobs in the Age of Emerging AI Technologies

By Waqas Fear AI taking your IT or cybersecurity job? Don't! Learn how AI creates new opportunities in network management, threat detection & more. This is a post from HackRead.com Read the original post: IT and Cybersecurity Jobs in the Age of Emerging AI Technologies

AI Lowers Barrier for Cyber-Adversary Manipulation in 2024 Election

Securing the presidential election requires vigilance and hardened cybersecurity defenses.

'MagicDot' Windows Weakness Allows Unprivileged Rootkit Activity

Malformed DOS paths in file-naming nomenclature in Windows could be used to conceal malicious content, files, and processes.

Cyberattack Takes Frontier Communications Offline

The local phone and business communications company said that attackers accessed unspecified PII, after infiltrating its internal networks.

Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware

It turns out that a powerful security solution can double as even more powerful malware, capable of granting comprehensive access over a targeted machine.