Possible Long-Term Attack by Unknown Hackers Thwarted Hackers exploiting flaws in Cleo Communications software instances had intimate knowledge of their internals and deployed a previously unknown family of malware, security researchers from Huntress said Thursday. Cleo published a patch Wednesday evening.
DOJ Indicts North Korean IT Workers for Using Remote Jobs to Steal Sensitive Info U.S. federal prosecutors indicted 14 North Koreans for a long-running IT scam generating $88 million by exploiting remote work with U.S. firms, a scheme prosecutors say is tied to DPRK-controlled companies that fund weapons programs through stolen identities, data theft and extortion.
Secret Blizzard Used Third-Party Amadey Bots to Hack Ukrainian Military Devices A Russian state-backed hacker group used third-party data-stealing bots and possibly a backdoor used by another Russia-based threat group to infiltrate and spy on devices used by frontline Ukrainian military units, according to a report from the Microsoft threat intelligence team.
Also: Australia Fines Kraken AU$8 Million Over Breaches This week, scammers targeted crypto workers with fake meeting apps, Australia fined Kraken crypto exchange operator Bit Trade, a Los Angeles federal court ordered five individuals to pay $5 million, Polish police detained a Russian former exchange operator and FTX debtors clawed back more cash.
A vulnerability was found in Linux Kernel up to 6.6.14/6.7.2/6.8-rc1. It has been rated as critical. This issue affects the function mlx5e_tc_del_fdb_peer_flow in the library lib/list_debug.c of the component mlx5e. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2023-52487. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.10.209/5.15.148/6.1.75/6.6.14/6.7.2. Affected by this issue is the function mtk_jpeg_dec_device_run of the component mtk-jpeg. The manipulation leads to use after free.
This vulnerability is handled as CVE-2023-52491. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.10.209/5.15.148/6.1.75/6.6.14/6.7.2. This affects the function parse_xfer_event of the component mhi. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2023-52493. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.14/6.7.2/6.8-rc1. It has been rated as problematic. This issue affects the function btrfs_submit_bio of the component scrub. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2024-26616. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.7.2. Affected by this issue is some unknown functionality of the file fs/proc/task_mmu of the component MMU Notifications Handler. The manipulation leads to race condition.
This vulnerability is handled as CVE-2024-26617. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.76/6.6.15/6.7.3/6.8-rc2. Affected by this vulnerability is an unknown functionality in the library /build/work/knet/arch/x86/lib/retpoline.S of the component ipmr. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-26626. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in britner Gutenberg Blocks Plugin up to 3.2.23 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-1541. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in Linux Kernel up to 6.8-rc1. Affected by this vulnerability is the function rmb_desc of the component smc. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-26615. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in jackc pgproto3 and pgx and classified as critical. This vulnerability affects unknown code of the component Protocol Message Size Handler. The manipulation leads to sql injection.
This vulnerability was named CVE-2024-27304. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.14/6.7.2/6.8-rc1 on ZC. It has been declared as critical. Affected by this vulnerability is the function bpf_xdp_adjust_tail of the component xsk. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-26611. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.7.2. It has been declared as critical. This vulnerability affects the function copy_to_user of the component hwrng. The manipulation leads to stack-based buffer overflow.
This vulnerability was named CVE-2023-52615. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.148/6.1.75/6.6.14/6.7.2. It has been classified as critical. This affects the function trans_stat_show of the component devfreq. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2023-52614. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.