Calenderweek 33

Security Experts Issue Warning About Cybercriminals Exploiting Cloudflare R2 for Phishing Page Hosting

Over the past half-year, there has been a significant uptick, a staggering 61-fold increase, in the utilization of Cloudflare R2 by threat actors for hosting phishing pages. According to Jan Michael, a security researcher at Netskope, these phishing campaigns primarily focus on acquiring Microsoft login credentials, although there are instances targeting Adobe, Dropbox, and various …

Security Experts Issue Warning About Cybercriminals Exploiting Cloudflare R2 for Phishing Page Hosting Read More »

Germany has the highest number of hacked Netscaler servers

While many Citrix Netscaler servers have been patched for a vulnerability known since July, attackers still maintain access. Security researchers from Fox-IT and the Dutch Institute of Vulnerability Disclosure (DIVD) jointly investigated a hacking campaign where malicious actors established webshells on Citrix Netscaler servers vulnerable to the CVE-2023-3519 security flaw. In total, nearly 2,000 systems …

Germany has the highest number of hacked Netscaler servers Read More »

Critical Vulnerability Exploited to Compromise Nearly 2,000 Citrix NetScaler Instances

Around 2,000 Citrix NetScaler instances have fallen victim to a backdoor attack, leveraging a recently disclosed critical security vulnerability as part of a widespread assault. According to an advisory from NCC Group, released on Tuesday, it appears that an attacker exploited CVE-2023-3519 in an automated manner, implanting web shells on vulnerable NetScalers to establish persistent …

Critical Vulnerability Exploited to Compromise Nearly 2,000 Citrix NetScaler Instances Read More »

Vulnerabilities in HPE Aruba Networking Products Enable Unauthorized File Overwriting

HPE Aruba Networking has identified two critical vulnerabilities, CVE-2023-38401 and CVE-2023-38402, affecting their Virtual Intranet Access (VIA) client designed for Microsoft Windows. In the event of a successful exploit, an attacker gains the ability to overwrite files without authorization. HPE Aruba Networking has taken immediate action to mitigate these high-severity vulnerabilities by releasing an update. …

Vulnerabilities in HPE Aruba Networking Products Enable Unauthorized File Overwriting Read More »

Vulnerability in Cisco Unified Communications Manager Enables SQL Injection Attacks by Attackers

A vulnerability in the web-based management interface of both Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) has been identified. Cisco Unified CM is primarily used for managing voice and video calls, while Cisco Unified CM SME handles session routing intelligence. This vulnerability allows a remote …

Vulnerability in Cisco Unified Communications Manager Enables SQL Injection Attacks by Attackers Read More »

The Raccoon Stealer Makes a Comeback with Enhanced Evasion Features

The cybercrime group responsible for Raccoon Stealer has made a comeback after a six-month break, unveiling version 2.3.0 of their malware. This version, aimed at cybercriminals, is being advertised on hacker forums. The group’s resurgence follows several setbacks in 2022, leading to a temporary shutdown of their operations. New Features and Updates in Version 2.3.0: …

The Raccoon Stealer Makes a Comeback with Enhanced Evasion Features Read More »

Python URL Parsing Vulnerability Opens Door to Command Execution Attacks

A critical security vulnerability has been identified in Python’s URL parsing function, urllib.parse, specifically affecting its ability to correctly handle URLs starting with blank characters. This flaw, assigned the identifier CVE-2023-24329 with a CVSS score of 7.5, poses a risk as it can be exploited to circumvent domain or protocol blocklists, potentially leading to unauthorized …

Python URL Parsing Vulnerability Opens Door to Command Execution Attacks Read More »

Hackers Successfully Breach ChatGPT Model Using Indirect Prompt Injection Technique

ChatGPT, quickly amassing over 100 million users following its release, has been part of a trend involving advanced models like GPT-4 and various smaller versions. These Large Language Models (LLMs) find extensive applications, yet their flexibility with natural prompts presents vulnerabilities. This susceptibility notably includes Prompt Injection attacks, where attackers can circumvent controls. The line …

Hackers Successfully Breach ChatGPT Model Using Indirect Prompt Injection Technique Read More »

Hacker may have the capability to shut down entire power plants through vulnerabilities in Codesys

Microsoft’s security researchers recently highlighted a series of severe vulnerabilities in the Codesys V3 SDK, commonly used in industrial programming for Programmable Logic Controllers (PLCs). Although exploiting these weaknesses is challenging, the potential damage they could cause is significant. These vulnerabilities could potentially allow attackers to shut down entire power plants, manipulate PLCs in unusual …

Hacker may have the capability to shut down entire power plants through vulnerabilities in Codesys Read More »

Scroll to Top