"Palo Alto Networks Shares Remediation Advice for Hacked Firewalls"

"Palo Alto Networks Shares Remediation Advice for Hacked Firewalls"

Palo Alto Networks recently shared remediation instructions for organizations whose firewalls have been hacked through the exploitation of the vulnerability tracked as CVE-2024-3400. The company noted that customers who detect unsuccessful exploitation attempts are advised to update to the latest PAN-OS hotfix. The same must be done by organizations that find evidence of someone testing their firewall to see if it's vulnerable, this typically involves creating an empty file on the firewall, but no unauthorized commands are executed.

Submitted by Adam Ekwall on

"WP Automatic WordPress Plugin Hit by Millions of SQL Injection Attacks"

"WP Automatic WordPress Plugin Hit by Millions of SQL Injection Attacks"

According to security researchers at PatchStack, hackers have started to target a critical severity vulnerability in the WP Automatic plugin for WordPress to create user accounts with administrative privileges and to plant backdoors for long-term access. Currently installed on more than 30,000 websites, WP Automatic lets administrators automate content importing (e.g. text, images, video) from various online sources and publishing on their WordPress site. The exploited vulnerability is identified as as CVE-2024-27956 and received a severity score of 9.9/10.

Submitted by Adam Ekwall on

"US Takes Down Illegal Cryptocurrency Mixing Service Samourai Wallet"

"US Takes Down Illegal Cryptocurrency Mixing Service Samourai Wallet"

The US government has recently taken down Samourai Wallet, a cryptocurrency mixing service that executed over $2bn in unlawful transactions and laundered over $100m in criminal proceeds. The Department of Justice (DoJ) recently announced that Samourai's web servers and domain were seized following a law enforcement operation in collaboration with Iceland's authorities. Additionally, the illegal cryptocurrency service's Android app has been removed from the Google Play Store in the US.

Submitted by Adam Ekwall on

"Maximum Severity Flowmon Bug Has a Public Exploit, Patch Now"

"Maximum Severity Flowmon Bug Has a Public Exploit, Patch Now"

Proof-of-Concept (PoC) exploit code has been released for a severe security vulnerability in Progress Flowmon, a tool used to monitor network performance and support visibility. Progress Flowmon features performance tracking, diagnostics, and more. It is used by over 1,500 companies worldwide, including SEGA, KIA, TDK, Volkswagen, Orange, and Tietoevry. The security issue, discovered by researchers at Rhino Security Labs and tracked as CVE-2024-2389, has a maximum severity score of 10.

Submitted by Gregory Rigby on

"Study: GPT-4 Agent Can Exploit Unpatched Vulnerabilities"

"Study: GPT-4 Agent Can Exploit Unpatched Vulnerabilities"

Researchers at the University of Illinois Urbana-Champaign discovered that feeding public security advisories to a GPT-4 Artificial Intelligence (AI) agent allows it to exploit unpatched "real-world" vulnerabilities even without precise technical information. The researchers fed AI agents descriptions of over a dozen disclosed but unpatched vulnerabilities (also called "one-day" flaws), including two "critical" bugs.

Submitted by Gregory Rigby on

 "Researchers Develop Malicious AI 'Worm' Targeting Generative AI Systems"

 "Researchers Develop Malicious AI 'Worm' Targeting Generative AI Systems"

A team of researchers from Cornell Tech, the Israel Institute of Technology, and Intuit developed a novel type of malware dubbed the "Morris II" worm, which uses popular Artificial Intelligence (AI) services to spread itself, infect systems, and steal data. The worm further highlights the potential dangers of AI security threats and the need to secure AI models. The team used an "adversarial self-replicating prompt" to create the worm.

Submitted by Gregory Rigby on

Cyber Scene - Against All Enemies, Foreign AND Domestic

Cyber Scene - Against All Enemies, Foreign AND Domestic

Image removed.

By krahal

This Cyber Scene will discuss the complexity of defending against cyberattacks not only from domestic and foreign enemies, but also address current issues of how these cyber enemies--domestic AND foreign together--complicate the defense of the US from its cyber enemies.

Submitted by Gregory Rigby on

"Cisco Raises Alarm for ArcaneDoor Zero-Days Hitting ASA Firewall Platforms"

"Cisco Raises Alarm for ArcaneDoor Zero-Days Hitting ASA Firewall Platforms"

Cisco recently warned that nation-state backed hacking teams are exploiting at least two zero-day vulnerabilities in its ASA firewall platforms to plant malware on telecommunications and energy sector networks. According to Cisco Talos, the attackers are taking aim at software defects in certain devices running Cisco Adaptive Security Appliance (ASA) or Cisco Firepower Threat Defense (FTD) products to implant malware, execute commands, and potentially exfiltrate data from compromised devices.

Submitted by Adam Ekwall on
Subscribe to