Aggregator
CVE-2024-45614 | Puma up to 5.6.8/6.4.2 Header X-Forwarded_For authorization (GHSA-9hf4-67fc-4vf4)
CVE-2024-40125 | Closed-Loop Technology CLESS Server 4.5.2 PHP unrestricted upload
CVE-2024-38221 | Microsoft Edge up to 128.0.2739.42 cross site scripting
CVE-2024-43496 | Microsoft Edge up to 128.0.2739.42 out-of-bounds write
CVE-2024-43489 | Microsoft Edge up to 128.0.2739.42 type confusion
CVE-2010-1179 | Apple iOS 3.1.3 numeric error (EDB-11890 / BID-38990)
简析自动化在安全运营中的4个典型用例及流程
查处3.1万余人!公安机关打击网络谣言取得显著成效;警惕一种新型凭证窃取手法:浏览器操控+恶意软件 | 牛览
CVE-2004-0671 | Symantec Brightmail AntiSpam up to 6.0 viewMsgDetails.do id privileges management (EDB-24251 / XFDB-16609)
CVE-2014-6867 | Sortir en Alsace 0.5b X.509 Certificate cryptographic issues (VU#582497)
ZDI-CAN-25373: Microsoft
CVE-2024-6867 | lunary-ai lunary up to 1.4.9 runs/{run_id}/related insufficient granularity of access control
CVE-2024-6087 | lunary-ai lunary up to 1.4.8 access control
CVE-2024-6582 | lunary-ai lunary up to 1.4.8 Setting saml.ts access control
CVE-2024-45696 | D-Link DIR-X4860 A1/COVR-X1870 Telnet Service backdoor
售价高达 100 万的 AI 产品,有钱人排队求买,为什么?
How to detect and stop bot activity
Bad bot traffic continues to rise year-over-year, accounting for nearly a third of all internet traffic in 2023. Bad bots access sensitive data, perpetrate fraud, steal proprietary information, and degrade site performance. New technologies are enabling fraudsters to strike faster and inflict more damage. Bots’ indiscriminate and large-scale attacks pose a risk to businesses of all sizes in all industries. But there are techniques your business can adopt to address this malicious activity. By leveraging … More →
The post How to detect and stop bot activity appeared first on Help Net Security.
CVE-2006-5934 | Iexpress Estate Agent Manager up to 1.3 sql injection (EDB-2773 / XFDB-30216)
Exploding pagers and the new face of asset-centric warfare
Attacks on critical infrastructure The explosion of the Soviet gas pipeline in 1982 was one of the first well-known instances of critical infrastructure being targeted through a software modification that contained a hidden malfunction. In this instance, the Soviets were stealing Western technology and the CIA slipped the flawed software to them without their knowledge. While the explosion itself didn’t cause any fatalities, it did cause some damage to the Soviet economy as per Washinton Post. With the intensification of hybrid warfare, we have seen multiple attacks on ICS-based critical infrastructure in Europe and the Middle East. These attacks were designed not just to destabilize the systems but also to cause a major kinetic impact. No systems or assets are out of bounds today. State-backed actors from countries like North Korea are not just after technology and revenue but also act as conduits for other countries to infiltrate the critical infrastructure of their adversary nations. Read more: Buyers guide to OT/ICS cybersecurity solutions A case study In a recent instance, Sectrio’s Asset Research Team uncovered an anomaly in hardware supplied to a critical infrastructure operator. In this instance, same OEM supplied was supposed to supply the same hardware to two divisions of the same business. However, the hardware supplied to one entity, when examined, showed a deviation that was found to enable a backdoor communication with an obscure server using a now obsolete protocol that was sparingly used in the 90s. The OEM in this case claimed that the anomaly was a generational remnant from an old version. How it made its way to only one piece of hardware and not the other is a question that was not answered to our satisfaction. The hardware belonged to the same batch and even had sequential serial numbers adding to the mystery. This could be a genuine error but it is an error that could potentially be exploited by a bad actor. Supply chain challenges As the Lebanon episode clearly showed, OEMs now have to ensure the integrity of their hardware well beyond their shop floors. ICS/OT operators should also watch out for anomalous behaviors and risky interactions that could jeopardize operations and plant safety levels. One way of offsetting these challenges is to ensure the systems undergo Security Acceptance Tests (SAT) along with Factory Acceptance Tests (FAT). This will ensure the integrity of the assets and call out any security issues before they are added to the infrastructure. A ‘maker-checker’ approach is the way to go. Recommended cybersecurity measures to risk-proof ICS assets While IEC 62443 and NIST CSF-based risk assessment and gap analysis is a good place to start, the outcomes of such an assessment can and should be used across the enterprise to improve security posture. Here are some of the other steps that can be taken to secure ICS and OT assets and infrastructure: Talk to us to learn how your crown jewels and assets can be protected through a custom-built ICS/OT cybersecurity plan. Contact us now! Book a consultation with our OT/ICS cybersecurity experts now. Contact Us Thinking of an ICS security training program for your employees? Talk to us for a custom package.
The post Exploding pagers and the new face of asset-centric warfare appeared first on Security Boulevard.