Security
Headlines
HeadlinesLatestCVEs

Tag

#google

Attackers Create Synthetic Security Researchers to Steal IP

Threat groups created a fake security company, "High Sierra," with faux exploits and fake profiles for security researchers on GitHub and elsewhere, aiming to get targets to install their malware.

DARKReading
#vulnerability#web#windows#google#microsoft#linux#git#intel#rce#zero_day#sap
ChamelDoH: New Linux Backdoor Utilizing DNS-over-HTTPS Tunneling for Covert CnC

The threat actor known as ChamelGang has been observed using a previously undocumented implant to backdoor Linux systems, marking a new expansion of the threat actor's capabilities. The malware, dubbed ChamelDoH by Stairwell, is a C++-based tool for communicating via DNS-over-HTTPS (DoH) tunneling. ChamelGang was first outed by Russian cybersecurity firm Positive Technologies in September 2021,

CVE-2023-2431: [Security Advisory] CVE-2023-2431: Bypass of seccomp profile enforcement

A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.

How Do I Protect My API Keys From Appearing in Search Results?

A few lines of code can help you prevent accidental exposure, manage sensitive information, and maintain different configurations for various environments.

Critical Barracuda ESG Zero-Day Linked to Novel Chinese APT

A PRC-aligned actor used a trio of custom malware to take advantage of inherent weaknesses in edge appliances.

Purle Devloper Panel 1.0 Insecure Direct Object Reference

Purle Devloper Panel version 1.0 suffers from an insecure direct object reference vulnerability that allows an unauthenticated user to update passwords.

Ptclab 3.5 Insecure Settings

Ptclab version 3.5 appears to leave default credentials installed after installation.

URLs have always been a great hiding place for threat actors

The information leak threats are certainly new, but the education and messaging from security evangelists (and even just anyone trying to educate an older or less security-savvy family member) doesn’t change.