HackDig : Dig high-quality web security articles

X-Force Identifies Vulnerability in IoT Platform

The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion a
Publish At:2023-04-05 15:10 | Read:574835 | Comments:0 | Tags:Application Security Endpoint Network Security Services Thre

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This i
Publish At:2023-03-21 17:15 | Read:929031 | Comments:0 | Tags:Software Vulnerabilities Application Security Endpoint Threa

Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers

Overview In this post, IBM Security X-Force Red offensive hackers analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities. Over the last few years, public accounts have increasingly shown that less sophisticated attackers are using this technique to achieve their objectives. It is therefor
Publish At:2023-02-21 11:39 | Read:821841 | Comments:0 | Tags:Software Vulnerabilities Application Security Endpoint Secur

Detecting the Undetected: The Risk to Your Info

IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories th
Publish At:2023-02-16 15:37 | Read:696187 | Comments:0 | Tags:Application Security CISO Security Services Threat Hunting c

Contain Breaches and Gain Visibility With Microsegmentation

Organizations must grapple with challenges from various market forces. Digital transformation, cloud adoption, hybrid work environments and geopolitical and economic challenges all have a part to play. These forces have especially manifested in more significant security threats to expanding IT attack surfaces.  Breach containment is essential, and zero
Publish At:2023-02-01 11:39 | Read:985795 | Comments:0 | Tags:Endpoint Risk Management Zero Trust Application Security Clo

Samsung Galaxy Store Flaws Can Lead to Unwanted App Installations, Code Execution

Cybersecurity firm NCC Group has shared details on two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.An alternative app marketplace, the Galaxy Store comes pre-installed on Samsung’s Android devices and can be used alongside Google Play to download and install soft
Publish At:2023-01-23 12:00 | Read:2125504 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Application Security Vul

Credential Leakage Fueling Rise in API Breaches

There is a problem with API security – it isn’t working very well, and it’s largely down to credential leakage. Most security professionals are confident in their own API credential management; but at the same time, most of the same professionals admit to having experienced a breach effected through compromised API credentials.In a survey of more than 400 US
Publish At:2023-01-19 12:00 | Read:555512 | Comments:0 | Tags:NEWS & INDUSTRY Application Security Identity & Acce

Exploited Control Web Panel Flaw Added to CISA 'Must-Patch' List

The US government’s cybersecurity agency CISA is giving federal agencies an early February deadline to patch a critical -- and already exploited -- security vulnerability in the widely used CentOS Control Web Panel utility.The agency added the CVE-2022-44877 flaw to its KEV (Known Exploited Vulnerabilities) catalog and set a February 7th deadline for federal
Publish At:2023-01-18 14:30 | Read:961651 | Comments:0 | Tags:Cyberwarfare Endpoint Security Network Security NEWS & I

Vendors Actively Bypass Security Patch for Year-Old Magento Vulnerability

Vendors and agencies are actively bypassing the security patch that Adobe released in February 2022 to address CVE-2022-24086, a critical mail template vulnerability in Adobe Commerce and Magento stores, ecommerce security firm Sansec warns.The CVE-2022-24086 bug (CVSS score of 9.8) is described as an improper input validation bug in the checkout process. It
Publish At:2023-01-18 14:30 | Read:1225129 | Comments:0 | Tags:Endpoint Security Network Security NEWS & INDUSTRY Appli

Critical Git Vulnerabilities Discovered in Source Code Security Audit

A source code security audit has led to the discovery of several vulnerabilities in Git, the widely used distributed version control system.The results of the security audit, sponsored by OSTIF and conducted by X41 and GitLab, were made public this week.Git could be a tempting target for threat actors as a vulnerability affecting the system could be exploite
Publish At:2023-01-18 12:00 | Read:565853 | Comments:0 | Tags:NEWS & INDUSTRY Application Security Vulnerabilities sec

Self-Checkout This Discord C2

This post was made possible through the contributions of James Kainth, Joseph Lozowski, and Philip Pedersen. In November 2022, during an incident investigation involving a self-checkout point-of-sale (POS) system in Europe, IBM Security X-Force identified a novel technique employed by an attacker to introduce a command and control (C2) channel
Publish At:2023-01-17 15:36 | Read:582999 | Comments:0 | Tags:Software Vulnerabilities Application Security Endpoint Incid

Attackers Can Abuse GitHub Codespaces for Malware Delivery

A GitHub Codespaces feature meant to help with code development and collaboration can be abused for malware delivery, Trend Micro reports.Generally available since November 2022, following a private preview period, GitHub Codespaces is a free cloud-based integrated development environment (IDE) that allows developers to create, edit, and run code in their br
Publish At:2023-01-17 10:32 | Read:564228 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Application Security

Researchers: Brace for Zoho ManageEngine 'Spray and Pray' Attacks

Security researchers tracking a known pre-authentication remote code execution vulnerability in Zoho’s ManageEngine products are warning organizations to brace for “spray and pray” attacks across the internet.The vulnerability, patched by Zoho last November, affects multiple Zoho ManageEngine products and can be reached over the internet to launch code execu
Publish At:2023-01-16 18:28 | Read:804313 | Comments:0 | Tags:Disaster Recovery Endpoint Security Network Security NEWS &a

Tesla Returns as Pwn2Own Hacker Takeover Target

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to complete vehicle compromise.Tesla, in tandem with Pwn2Own organizations Zero Day Initiative, is offering a $600,000 cash prize to any hacker capable of writing exploits that pivot through multiple systems
Publish At:2023-01-12 18:28 | Read:648909 | Comments:0 | Tags:Endpoint Security Network Security NEWS & INDUSTRY Appli

Investors Bet Big on Subscription-Based Security Skills Training

Hack The Box, a British startup working on technology to simplify cybersecurity skills training, has banked a $55 million funding round as venture capital investors place big bets on the subscription-based talent assessment space.Hack the Box said the $55 million Series B was led by global investment firm Carlyle. Paladin Capital Group, Osage University Part
Publish At:2023-01-11 14:30 | Read:636889 | Comments:0 | Tags:Cyberwarfare Endpoint Security Network Security NEWS & I


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud