The Return of the Laptop From Hell
California court refuses to dismiss computer crime charges against an entity that analyzed Hunter Biden’s laptop.
The post The Return of the Laptop From Hell appeared first on Security Boulevard.
California court refuses to dismiss computer crime charges against an entity that analyzed Hunter Biden’s laptop.
The post The Return of the Laptop From Hell appeared first on Security Boulevard.
Tosint is an open-source Telegram OSINT tool that extracts useful information from Telegram bots and channels. It’s suited for security researchers, investigators, and others who want to gather insights from Telegram sources. Several law enforcement agencies utilize Tosint to gather intelligence and monitor cybercriminal activities. “I created Tosint to analyze and track cybercriminals, particularly those involved in phishing attacks. As head of threat intelligence at D3Lab, I counter phishing for various Italian and international banks … More →
The post Tosint: Open-source Telegram OSINT tool appeared first on Help Net Security.
But as we start delegating LLMs and LAMs the authority to act on our behalf (our personal avatars), we create a true data privacy nightmare.
The post How the Promise of AI Will Be a Nightmare for Data Privacy appeared first on Security Boulevard.
In this Help Net Security interview, Nadir Izrael, CTO at Armis, discusses how AI has transformed cyberwarfare by amplifying attacks’ scale and sophistication. Izrael emphasizes the need for AI-powered defenses and proactive cybersecurity strategies to combat these evolving threats. How has adopting AI transformed the nature of cyberwarfare, and what specific capabilities does it offer to threat actors? AI has transformed the nature of cyberwarfare. Threat actors can amplify the scale and sophistication of attacks … More →
The post Developing an effective cyberwarfare response plan appeared first on Help Net Security.
GitLab 发布了关键更新以解决多个漏洞,其中最严重的漏洞 (CVE-2024-6678) 允许攻击者在特定条件下以任意用户身份触发管道。
此版本适用于 GitLab 社区版 (CE) 和企业版 (EE) 的 17.3.2、17.2.5 和 17.1.7 版本,并作为每两个月 (计划) 安全更新的一部分修补了总共 18 个安全问题。
CVE-2024-6678 漏洞的严重程度评分为 9.9,该漏洞可能使攻击者能够以停止操作作业的所有者的身份执行环境停止操作。
该漏洞的严重性在于其可能被远程利用、缺乏用户交互以及利用该漏洞所需的权限较低。GitLab 称,该问题影响 CE/EE 版本 8.14 至 17.1.7、17.2 至 17.2.5 之前的版本以及 17.3 至 17.3.2 之前的版本。他们强烈建议所有运行受下述问题影响的版本的安装尽快升级到最新版本。
GitLab 管道是用于构建、测试和部署代码的自动化工作流程,是 GitLab CI/CD(持续集成/持续交付)系统的一部分。它们旨在通过自动执行重复任务并确保对代码库的更改进行一致测试和部署来简化软件开发流程。
GitLab 近几个月多次解决任意管道执行漏洞,包括 2024 年 7 月修复 CVE-2024-6385、2024 年 6 月修复 CVE-2024-5655 以及 2023 年 9 月修补 CVE-2023-5009,均被评为严重。
该公告还列出了四个严重性较高的问题,评分在 6.7 到 8.5 之间,这些问题可能会让攻击者破坏服务、执行未经授权的命令或破坏敏感资源。这些问题总结如下:
·CVE-2024-8640:由于输入过滤不当,攻击者可以通过 YAML 配置将命令注入连接的 Cube 服务器,从而可能损害数据完整性。从 16.11 开始影响 GitLab EE。
·CVE-2024-8635:攻击者可以通过制作自定义 Maven 依赖代理 URL 来向内部资源发出请求,从而利用服务器端请求伪造 (SSRF) 漏洞,从而危害内部基础设施。从 16.8 开始影响 GitLab EE。
·CVE-2024-8124:攻击者可以通过发送较大的“glm_source”参数触发 DoS 攻击,从而使系统不堪重负并不可用。从 16.4 开始影响 GitLab CE/EE。
·CVE-2024-8641:攻击者可以利用 CI_JOB_TOKEN 获取受害者 GitLab 会话令牌的访问权限,从而劫持会话。从 13.7 开始影响 GitLab CE/EE。