Summary
A software company specializing in auditing tools suffered an attack over the course of the the past four months and disclosed this month. Several news outlets have reported on the attack and the vulnerability used to exploit a zero-day vulnerability.
Threat Type
Vulnerability, Breach
Overview
An investigation by Codecov led to the discovery of a supply-chain attack that has been occurring since January 2021. The maker of auditing tools stated a threat actor had modified Bash Uploader script and exp
Summary
The ICS-CERT has published two advisories that affect the Schneider Electric C-Bus Toolkit, and the EIPStackGroup OpENer Ethernet/IP.
Threat Type
Vulnerability
Overview
The ICS-CERT has published two advisories that affect the Schneider Electric C-Bus Toolkit, and the EIPStackGroup OpENer Ethernet/IP. Further information is available from the advisories which are summarized below.
ICS Advisory ICSA-21-105-01 - Schneider Electric C-Bus Toolkit
CVE-2021-22716 - The affected product is vulnerable to Im
Summary
Google has released an update to its Chrome web browser for Windows, Mac, and Linux that provides fixes for thirty-seven vulnerabilities. Of the nineteen CVE-numbered vulnerabilities noted in the advisory, Google has six of them rated as High, ten as Moderate, and three as Low.
Threat Type
Vulnerability
Overview
Google has released an update, version 90.0.4430.72, to its Chrome web browser for Windows, Mac, and Linux that provides fixes for thirty-seven vulnerabilities. Of the nineteen CVE-numbered
A nifty way for adversaries to acquire passwords during post-exploitation is to spoof credential dialogs and perform a local phishing attack. This means tricking a user on a compromised computer to enter their password.
Unfortunately, users are conditioned to enter their credentials frequently and therefore don’t question random passwords prompts too much.
Long, long time ago… but nothing has changed The idea to spoof a credential dialog is one of the most simple ideas one might come up with.