Hello all,
This week we bid farewell to Red-N-Security News and welcome Red Dot Security News. New name, same content scoured from all over the web in the prior week, bringing commentary of items that I find of high value or just plain interesting. As usual, my commentary is followed by a plethora of links to other items that are worth skimming to see if they interest you or pertain to your particular environment or of those you support. The change of N to Dot is small, but it better reflects the branding of the company that I’m blessed to call my home – Integris.
Thankfully this week was a reprieve from the past two weeks’ worth of massive software bugs, faults, and defects that were announced. By now your various vetting systems should have done their job and you should be in full-swing of the deployment treadmill cycle. The longer you delay, the more time threat actors have to find the vulnerabilities and/or weaponize Proof of Concept (PoC) code that could already be publicly available.
Headline NEWS:
- Atlassian released patches for quite a few products. There were nine high-severity vulnerabilities plugged and while Atlassian has not indicated that any are currently being exploited, as we know, it is just a matter of time.
- F5 has patched nine vulnerabilities in their BIG-IP and NGINX-Plus products. There is mitigation advice for some of the issues if you can’t patch immediately. Since these tend to be internet-facing, make them a priority so bad guys don’t spoil your week.
- GitHub Enterprise Server needed a patch to plug a critical authentication bypass flaw that if exploited could allow a threat actor to gain administrative privilege. GitHub warns that you read the “known issues” section before applying it as there are potential problems with this update. Geez, you can’t win. Patch and break something, don’t patch and get compromised.
- Google released a new update for Chrome to plug the seventh (depending on whose scorecard you’re using) zero day of the year. Again, it is in the V8 JavaScript engine, and is already under active exploitation. There were several other security items and flaws fixed, so make sure you update your browser ASAP.
- Microsoft Edge plugged a Remote Code Execution (RCE) flaw that could allow an attacker to take over the system. As is usual for this type of patch, details are scant, so update quickly. Also, expect that all other Chromium based browsers will be patching for the Google and Microsoft revealed issues soon, so watch for them and update when available.
- Microsoft Windows “DownDate” In an attempt to get Microsoft to push the gas-pedal a bit, a PoC has been published by the discoverer of this massive flaw. Microsoft has had the details since February and a fully functional patch still hasn’t been released, and their present mitigation guidance is rather lackluster and easily defeated.
In Ransomware, Malware, and Vulnerabilities News:
- IRS is working to improve data security after “a contractor leaked sensitive information on thousands of taxpayers.” I know this isn’t the forum for it, but here’s an idea, eliminate this regressive tax system and replace it with a national sales tax so there’s no danger of IRS leaking our information – since they won’t have it.
- SolarWinds, every time I see this name in CyberSecurity news articles I get a little shiver up my spine. This one reinforces that chill. They had a hard-coded password in the Web Help Desk product that allows for unauthenticated remote threat actor access. You might want to patch this yesterday if you use it.
In Other News Events of Note and Interest:
- AI copilots are making internal breaches easier and costlier to defend against. While AI assistants are nearly magical in how they are transforming our digital lives, they are proving to be equally slight-of-hand magical when it comes to maintaining confidentiality. With the immense access that they have to your day-to-day data, researchers are now finding ways to convince our digital assistant friends into becoming frenemies that spill your secrets with the right levels of prompt engineering.
- NSA issues tips for better logging is an excellent collaboration piece between agencies around the world. However, wouldn’t it be easier if the NSA just provided us the logs we need in the event of a cyber event?
In Cyber Insurance News:
- IT Consultants also need business interruption Insurance does a great job of outlining why you may want to consider this type of coverage for yourself.
Do you have a Solar Weather contingency plan? Are you even aware that we have a National Space Weather Prediction Center? Why is this being brought up you ask? Good question, I’ll tell you. Our sun goes through two 11-year periods known as Solar Cycles. There is a Solar Maximum and a Solar Minimum. In a Maximum, there are large numbers of solar flares which often produce Coronal Mass Ejections (CME). In a Solar Minimum there are very few of these. Currently we are in Solar Cycle 25 and are expected to hit the peak of the Solar Maximum sometime in 2025. And as you’ve seen there have already been quite a few spectacular CMEs recently that have resulted in Aurora Borealis in places that normally don’t see them. These colorful lights are the result of high energy particles ejected from the sun impacting our magnetosphere, the Earth’s natural defense shield. These same high-energy particles, when they reach the Earth’s surface cause an electrical imbalance that can cause significant power issues. If there was a sufficiently large CME that impacted our world, it could potentially result in massive amounts of damage to electronics and to power grids. Power could be down for months in places. Yep, months. Here’s a link that does a great job of describing this phenomenon. Does your Business Continuity Plan have such a prospect in it? Perhaps it should.
Keep the shields up, even the magnetic one.
Viscount Jan Broucinek
Red Dot Security News
Headline NEWS
- Atlassian Patches Vulnerabilities in Bamboo, Confluence, Crowd, Jira
- F5 Patches High-Severity Vulnerabilities in BIG-IP, NGINX Plus
- GitHub Enterprise Server vulnerable to critical auth bypass flaw
- Google Chrome Zero-day Vulnerability (CVE-2024-7971) Actively Exploited in The Wild
- Microsoft Edge RCE Vulnerability Let Attackers Take Control of the System
- PoC Exploit Released for Microsoft Windows 0-Day Downgrade Attack
Ransomware, Malware, and Vulnerabilities News
- CISA warns of Jenkins RCE bug exploited in ransomware attacks
- CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September
- IRS working to improve data security after major tax return leak
- AMD reverses course and will patch Ryzen 3000 after all
- Outlook Zero-click RCE Vulnerability Technical Details Released
- SolarWinds left hardcoded credentials in helpdesk product
- Iran hacked Trump campaign, US intelligence confirms
- Iranian cyberespionage group deploys new BlackSmith malware in spear-phishing campaign
- Gigabyte details BIOS roll-out plan to neutralize Sinkclose vulnerability
- New PEAKLIGHT Dropper Deployed in Attacks Targeting Windows with Malicious Movie Downloads
- Helsinki braced for elevated cyber attacks
- Local Networks Go Global When Domain Names Collide
- Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide
- How fake news spreads, Chinese Bot Farms
- Stealthy ‘sedexp’ Linux malware evaded detection for two years
- Las Vegas police: 3 accused of stealing thousands in text message phishing scheme
- Hackers Exploit Email URL Rewriting to Insert Phishing Links
- Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks
- The evolving threat landscape: Staying ahead of phishing attack trends
- Post-Compromise Security: What to do When the Hackers Get in
- 6 Ways Spammers Exploit Google With Reddit
- Most ransomware attacks occur between 1 a.m. and 5 a.m.
- AI copilots are making internal breaches easier and costlier
- Slack AI can be tricked into leaking data from private channels via prompt injection
- Copilot Studio Vulnerability Exploited to Access Sensitive Information
- TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset
- Americans duped by romance & pig butchering scams have ‘paid for North Korea’s missile program’
- Hack on North Miami Tests Ransom Payment Bans
- Hackers target online shoppers in new Adobe e-commerce malware campaign
- National Public Data Says Breach Impacts 1.3 Million People
- The saga of the National Public Data Social Security number leak continues
- Data leak affecting everyone in the US, UK, and Canada even worse than we thought
- Over 100,000 Oregon Zoo visitors’ credit card information compromised in data breach
- Toyota confirms breach after stolen data leaks on hacking forum
- American Radio Relay League confirms $1 million ransom payment
- Microchip Technology discloses cyberattack impacting operations
- Halliburton Hit by Cyberattack, Operations Disrupted
- US oil giant Halliburton confirms cyberattack behind systems shutdown
- Qilin ransomware now steals credentials from Chrome browsers
- Chinese Threat Actors Use MSI Files to Bypass Windows, VT Detection
- Ransomware rakes in record-breaking $450 million in first half of 2024
- The changing dynamics of ransomware as law enforcement strikes
- Cybercriminals exploit file sharing services to advance phishing attacks
- FlightAware configuration error leaked user data for years
- IRGC-Linked Hackers Roll Malware into Monolithic Trojan
- Fed’s Barr warns of ‘concentration risk’ in cybersecurity for banks
- Linux Kernal Vulnerability Let Attackers Write on Memory
- Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor
- Digital wallets can allow purchases with stolen credit cards
- Android Users Warned Fingerprint and Credit Card Data at Risk
- Android & iOS Users Targeted with New Phishing Attack Using PWAs & WebAPKs
- Apple Re-Releases iOS 17.6.1 With Advanced Data Protection Bug Fix
- New macOS Malware “Cthulhu Stealer” Targets Apple Users’ Data
- Vulnerabilities in Microsoft’s macOS apps could help hackers access microphones and cameras
- Critical Flaw in Donation Plugin Exposed 100,000 WordPress Sites to Takeover
- Critical Flaw in WordPress LiteSpeed Cache Plugin Allows Hackers Admin Access
Other News Events of Note and Interest
- Cool Tool: LibreOffice 24.8 Released, This is What’s New
- CISA to receive new headquarters on the St. Elizabeths West Campus
- FAA to issue cyber rule for newly built airplanes and equipment
- NSA Issues Tips for Better Logging, Threat Detection in LotL Incidents
- DOJ sues Georgia Tech over allegedly failing to meet cyber requirements for DOD contracts
- VMware Customers Report Massive Price Increases Since Broadcom Deal
- Intel releases new Wi-Fi driver with Wi-Fi 7 support for Windows 11 version 24H2
- Facial recognition software leads to arrest at Tampa International Airport
- Google Cloud Unveils New Security Services and Capabilities
- Google debuts free ‘Prompt Gallery’ in AI Studio, supercharging developer tools
- How domain registrars have increased .com prices
- What’s the difference between Microsoft SharePoint and OneDrive?
- What Makes Cloud Storage Secure?
- Amiga, Interrupted: A Fresh Take On Amiga OS
- The AI photo editing era is here
- Demand for AI is driving data center water consumption sky high
- Microsoft says AI is a guide and not an outright replacement for professionals
- New Windows 10 22H2 beta fixes memory leaks and crashes
- August Windows updates break dual boot on some Linux systems
- Microsoft says it’s finally getting rid of Control Panel in Windows
- Microsoft closes Windows 11 upgrade loophole in latest Insider build
- Microsoft Teams’ new single app for personal and work is now available
- Microsoft Loop 2.0 comes with a revamped UI and several improvements
- OneDrive explained: A comprehensive guide to Microsoft’s cloud storage
- Microsoft Edge PDF reader is getting more Copilot AI features
- Microsoft: August updates cause Windows Server boot issues, freezes
- Microsoft will host a security conference after the CrowdStrike shutdown
- Microsoft is discontinuing rounded tabs in Edge
Cyber Insurance News
- Cyber insurance claims fall as businesses refuse ransom payments and recover themselves
- 5 reasons cyber fraud insurance is essential in digital age
- IT consultants also need business interruption insurance