Security
Headlines
HeadlinesLatestCVEs

Tag

#intel

CVE-2023-31902: Mobile Mouse code execution | - RedPacket Security

RPA Technology Mobile Mouse 3.6.0.4 is vulnerable to Remote Code Execution (RCE).

CVE
#vulnerability#web#intel#rce
Microsoft Digital Defense Report: Nation-State Threats and Cyber Mercenaries

In part three of this three-part series, Microsoft dissects these twinned threats and what organizations can do to reduce or eliminate their risk.

Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover

A financially motivated cyber actor has been observed abusing Microsoft Azure Serial Console on virtual machines (VMs) to install third-party remote management tools within compromised environments. Google-owned Mandiant attributed the activity to a threat group it tracks under the name UNC3944, which is also known as Roasted 0ktapus and Scattered Spider. "This method of attack was unique in

State-Sponsored Sidewinder Hacker Group's Covert Attack Infrastructure Uncovered

Cybersecurity researchers have unearthed previously undocumented attack infrastructure used by the prolific state-sponsored group SideWinder to strike entities located in Pakistan and China. This comprises a network of 55 domains and IP addresses used by the threat actor, cybersecurity companies Group-IB and Bridewell said in a joint report shared with The Hacker News. "The identified phishing

CVE-2023-2706: OTP Login Woocommerce & Gravity Forms <= 2.2 - Authentication Bypass to Privilege Escalation — Wordfence Intelligence

The OTP Login Woocommerce & Gravity Forms plugin for WordPress is vulnerable to authentication bypass. This is due to the fact that when generating OTP codes for users to use in order to login via phone number, the plugin returns these codes in an AJAX response. This makes it possible for unauthenticated attackers to obtain login codes for administrators. This does require an attacker have access to the phone number configured for an account, which can be obtained via social engineering or reconnaissance.

CVE-2023-2528: Contact Form by Supsystic <= 1.7.24 - Cross-Site Request Forgery via AJAX action — Wordfence Intelligence

The Contact Form by Supsystic plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.24. This is due to missing or incorrect nonce validation on the AJAX action handler. This makes it possible for unauthenticated attackers to execute AJAX actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Attackers Target macOS With 'Geacon' Cobalt Strike Tool

Threat actors seen using Go-language implementation of the red-teaming tool on Intel and Apple silicon-based macOS systems.

XM Cyber Announces Partnership With SAP to Deliver Robust Security for Hybrid Environments

Partnership will provide SAP customers with comprehensive exposure management capabilities and in-depth visibility of attack surfaces.

Kiddoware Kids Place Parental Control Android App 3.8.49 XSS / CSRF / File Upload

Kiddoware Kids Place Parental Control Android App versions 3.8.49 and below suffer from weak hashing, cross site request forgery, cross site scripting, and arbitrary file upload vulnerabilities.

Qilin Ransomware Operation Outfits Affiliates With Sleek, Turnkey Cyberattacks

Researchers infiltrate a ransomware operation and discover slick services behind Qilin's Rust-based malware variant.