What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
AlienVault.webp 2023-08-15 10:00:00 Pourquoi la sécurité de l'API est-elle la prochaine grande chose en cybersécurité?
Why is API security the next big thing in Cybersecurity?
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  APIs, formally known as application programming interfaces, occupy a significant position in modern software development. They revolutionized how web applications work by facilitating applications, containers, and microservices to exchange data and information smoothly. Developers can link APIs with multiple software or other internal systems that help businesses to interact with their clients and make informed decisions. Despite the countless benefits, hackers can exploit vulnerabilities within the APIs to gain unauthorized access to sensitive data resulting in data breaches, financial losses, and reputational damage. Therefore, businesses need to understand the API security threat landscape and look out for the best ways to mitigate them. The urgent need to enhance API security  APIs enable data exchanges among applications and systems and help in the seamless execution of complex tasks. But as the average number of APIs rises, organizations often overlook their vulnerabilities, making them a prime target of hackers. The State of API Security Q1 Report 2023 survey finding concluded that the attacks targeting APIs had increased 400% during the past six months. Security vulnerabilities within APIs compromise critical systems, resulting in unauthorized access and data breaches like Twitter and Optus API breaches. Cybercriminals can exploit the vulnerabilities and launch various attacks like authentication attacks, distributed denial-of-service attacks (DDoS), and malware attacks. API security has emerged as a significant business issue as another report reveals that by 2023, API abuses will be the most frequent attack vector causing data breaches, and also, 50% of data theft incidents will happen due to insecure APIs. As a result, API security has. become a top priority for organizations to safeguard their data, which may cost businesses $75 billion annually. Why does API security still pose a threat in 2023? Securing APIs has always been a daunting task for most organizations, mainly because of the misconfigurations within APIs and the rise in cloud data breaches. As the security landscape evolved, API sprawl became the top reason that posed a threat to API security. API sprawl is the uncontrolled proliferation of APIs across an organization and is a common problem for enterprises with multiple applications, services, and development teams. As more APIs are created, they expanded the attack surface and emerged as an attractive target for hackers. The issue is that the APIs are not always designed by keeping security standards in mind. This leads to a lack of authorization and authentication, exposing sensitive data like personally identifiable information (PII) or other business data.  API sprawl Malware Tool Vulnerability Threat Cloud Uber ★★★
Checkpoint.webp 2023-08-14 17:28:10 Le point de contrôle remporte Gold Stevie International Business Award
Check Point Wins Gold Stevie International Business Award
(lien direct)
> & # 160;Le point de chèque est ravi d'accepter le prix international Business Awards \\ 'Gold Stevie pour notre plateforme de sécurité quantique Titan!Au point de contrôle, nous transformons comment les organisations sécurisent leurs réseaux dans les environnements sur site, cloud et IoT.Propulsé par ThreatCloud AI, Quantum Titan fournit une prévention avancée des menaces et une protection contre les cyberattaques les plus sophistiquées, y compris les exploits de système de phishing et de nom de domaine zéro-jour.Alors que les cyberattaques sont devenues plus sophistiquées avec une fréquence et un coût accrus, l'expansion des appareils IoT sur les réseaux et les environnements multi-clouds a créé plus de complexité des réseaux et de menaces pour une organisation.Quantum Titan répond à la nécessité d'une meilleure sécurité et [& # 8230;]
>  Check Point is thrilled to accept the International Business Awards\' Gold Stevie award for our Quantum Titan security platform! At Check Point, we are transforming how organizations secure their networks across on-premise, cloud and IoT environments. Powered by ThreatCloud AI, Quantum Titan provides advanced threat prevention and protection against the most sophisticated cyberattacks, including zero-day phishing and domain name system exploits. While cyberattacks have become more sophisticated with increased frequency and cost, IoT device expansion on networks and multi-cloud environments have created more network complexity and threats to an organization. Quantum Titan addresses the need for better security and […]
Threat Cloud ★★
The_Hackers_News.webp 2023-08-14 16:43:00 Détection et réponse de la menace d'identité: déchire votre tissu d'identité
Identity Threat Detection and Response: Rips in Your Identity Fabric
(lien direct)
Pourquoi la sécurité SaaS est un défi Dans le paysage numérique d'aujourd'hui, les organisations comptent de plus en plus sur les applications logicielles en tant que service (SaaS) pour stimuler leurs opérations.Cependant, cette adoption généralisée a également ouvert les portes à de nouveaux risques de sécurité et vulnérabilités. La surface d'attaque de sécurité SaaS continue de s'élargir.Cela a commencé par gérer des erreurs de condamnation et nécessite maintenant un
Why SaaS Security Is a Challenge In today\'s digital landscape, organizations are increasingly relying on Software-as-a-Service (SaaS) applications to drive their operations. However, this widespread adoption has also opened the doors to new security risks and vulnerabilities. The SaaS security attack surface continues to widen. It started with managing misconfigurations and now requires a
Threat Cloud ★★
TechWorm.webp 2023-08-14 15:01:22 La plate-forme OpenXDR stellar Cyber \\ est désormais disponible sur Oracle Cloud Infrastructure
Stellar Cyber\\'s OpenXDR Platform Now Available On Oracle Cloud Infrastructure
(lien direct)
Silicon Valley-based cybersecurity company, Stellar Cyber, announced today that their OpenXDR platform is now accessible to those that use Oracle Cloud Infrastructure (OCI). Customers who have adopted the cloud and seek simpler and smarter solutions to improve their security can now purchase Stellar Cyberr\'s platform via the Oracle Cloud Marketplace,  applying Oracle Universal Credits (OUCs) toward the purchase price. How does OpenXDR technology help businesses to better manage the security of their cloud structures, and what does this new partnership mean for Oracle Cloud users? Table Of ContentsCapabilities of Stellar Cyber\'s OpenXDR PlatformNow Available on Oracle Cloud InfrastructureThe Future of Cloud Security Capabilities of Stellar Cyber\'s OpenXDR Platform Stellar Cyber has developed Open Extended Detection and Response (OpenXDR) to facilitate security for both companies facing a large volume of attacks and overwhelmed security professionals. To achieve this, it unites the capabilities of several tools that are essential for security - many of which used to be incompatible. Some of the security solutions that are currently integrated into the platform are NextGen SIEM and Network Detection and Response (NDR). One of the key issues that the company has focused on since its beginning is the large quantity of data that is incoming from versatile incompatible security tools. Today, the issue of having to manage and make sense of large amounts of data is more emphasized than ever before. Why? Because organizations have added more security points to their systems - mostly to protect the new cloud technology that is now a regular part of their network. For instance, the data management solution integrated within OpenXDR can gather insights that are generated from versatile tools the platform supports. To make the reports more accurate and comprehensive, it can correlate the findings gathered from the tools it supports. As a result, the professionals retain visibility of ever-growing attack surfaces and get correct as well as actionable reports on the state of security in real-time. This helps them to react to sophisticated threats early - before they escalate into major security incidents. The tools that can be found under Stellar Cyber\'s umbrella platform are AI and machine-learning-powered. This means that they promptly and automatically mitigate well-known threats, but they continually learn about the company and use the findings to detect anomalies early. Also, they\'re available from a single dashboard since the platform unites the capabilities of versatile previously siloed solutions in one place. For those that already use Oracle Cloud, the new collaborations mean they\'ll now have the capabilities of the OpenXDR platform at their disposal as well. “Stellar Cyber is committed to providing the critical capabilities security teams need to deliver consistent security outcomes-all for a single license and price on a single platform,” said Jim O\'Hara, Chief Revenue Officer at Stellar Cyber. “This simple yet comprehensive model makes it easy for customers to measure how our Open XDR platform dramatically impacts their security ROI.” Now Available on Oracle Cloud Infrastructure Oracle Clou Tool Threat Cloud ★★
Netskope.webp 2023-08-14 14:05:39 La campagne de phishing évasive vole les informations d'identification cloud à l'aide de CloudFlare R2 et de tourniquet
Evasive Phishing Campaign Steals Cloud Credentials Using Cloudflare R2 and Turnstile
(lien direct)
> De février à juillet 2023, Netskope Threat Labs a suivi une augmentation stupéfiante de 61 fois le trafic vers les pages de phishing hébergées dans CloudFlare R2.La majorité des campagnes de phishing ciblent les informations d'identification de connexion Microsoft, bien qu'il existe des pages ciblant Adobe, Dropbox et d'autres applications cloud.Les attaques ont ciblé les victimes principalement dans le nord [& # 8230;]
>From February to July 2023, Netskope Threat Labs has been tracking a staggering 61-fold increase in traffic to phishing pages hosted in Cloudflare R2. The majority of the phishing campaigns target Microsoft login credentials, although there are some pages targeting Adobe, Dropbox, and other cloud apps. The attacks have been targeting victims mainly in North […]
Threat Cloud ★★
SecurityWeek.webp 2023-08-14 13:52:34 US Cyber Sécurité pour examiner les attaques de cloud
US Cyber Safety Board to Review Cloud Attacks
(lien direct)
> Le CSRB du gouvernement américain \\ procédera à un examen de la sécurité du cloud pour fournir des recommandations sur l'amélioration de la gestion et de l'authentification de l'identité.
>The US government\'s CSRB will conduct a review of cloud security to provide recommendations on improving identity management and authentication.
Cloud ★★
AlienVault.webp 2023-08-14 10:00:00 Construire la cybersécurité dans la chaîne d'approvisionnement est essentiel à mesure que les menaces montent
Building Cybersecurity into the supply chain is essential as threats mount
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The supply chain, already fragile in the USA, is at severe and significant risk of damage by cyberattacks. According to research analyzed by Forbes, supply chain attacks now account for a huge 62% of all commercial attacks, a clear indication of the scale of the challenge faced by the supply chain and the logistics industry as a whole. There are solutions out there, however, and the most simple of these concerns a simple upskilling of supply chain professionals to be aware of cybersecurity systems and threats. In an industry dominated by the need for trust, this is something that perhaps can come naturally for the supply chain. Building trust and awareness At the heart of a successful supply chain relationship is trust between partners. Building that trust, and securing high quality business partners, relies on a few factors. Cybersecurity experts and responsible officers will see some familiarity - due diligence, scrutiny over figures, and continuous monitoring. In simple terms, an effective framework of checking and rechecking work, monitored for compliance on all sides. These factors are a key part of new federal cybersecurity rules, according to news agency Reuters. Among other measures are a requirement for companies to have rigorous control over system patching, and measures that would require cloud hosted services to identify foreign customers. These are simple but important steps, and give a hint to supply chain businesses as to what they should be doing; putting in measures to monitor, control, and enact compliance on cybersecurity threats. That being said, it can be the case that the software isn’t in place within individual businesses to ensure that level of control. The right tools, and the right personnel, is also essential. The importance of software Back in April, the UK’s National Cyber Security Centre released details of specific threats made by Russian actors against business infrastructure in the USA and UK. Highlighted in this were specific weaknesses in business systems, and that includes in hardware and software used by millions of businesses worldwide. The message is simple - even industry standard software and devices have their problems, and businesses have to keep track of that. There are two arms to ensure this is completed. Firstly, the business should have a cybersecurity officer in place whose role it is to monitor current measures and ensure they are kept up to date. Secondly, budget and time must be allocated at an executive level firstly to promote networking between the business and cybersecurity firms, and between partner businesses to ensure that even cybersecurity measures are implemented across the chain. Utilizing AI There is something of a digital arms race when it comes to artificial intelligence. As ZDNet notes, the lack of clear regulation is providing a lot of leeway for malicious actors to innovate, but for businesses to act, too. While regulations are now coming in, it remains that there is a clear role for AI in prevention. According t Threat Cloud APT 28 ChatGPT ★★
ComputerWeekly.webp 2023-08-14 09:45:00 US Cyber Board pour sonder la sécurité du cloud après le dernier piratage d'échange
US Cyber Board to probe cloud security after latest Exchange hack
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  The supply chain, already fragile in the USA, is at severe and significant risk of damage by cyberattacks. According to research analyzed by Forbes, supply chain attacks now account for a huge 62% of all commercial attacks, a clear indication of the scale of the challenge faced by the supply chain and the logistics industry as a whole. There are solutions out there, however, and the most simple of these concerns a simple upskilling of supply chain professionals to be aware of cybersecurity systems and threats. In an industry dominated by the need for trust, this is something that perhaps can come naturally for the supply chain. Building trust and awareness At the heart of a successful supply chain relationship is trust between partners. Building that trust, and securing high quality business partners, relies on a few factors. Cybersecurity experts and responsible officers will see some familiarity - due diligence, scrutiny over figures, and continuous monitoring. In simple terms, an effective framework of checking and rechecking work, monitored for compliance on all sides. These factors are a key part of new federal cybersecurity rules, according to news agency Reuters. Among other measures are a requirement for companies to have rigorous control over system patching, and measures that would require cloud hosted services to identify foreign customers. These are simple but important steps, and give a hint to supply chain businesses as to what they should be doing; putting in measures to monitor, control, and enact compliance on cybersecurity threats. That being said, it can be the case that the software isn’t in place within individual businesses to ensure that level of control. The right tools, and the right personnel, is also essential. The importance of software Back in April, the UK’s National Cyber Security Centre released details of specific threats made by Russian actors against business infrastructure in the USA and UK. Highlighted in this were specific weaknesses in business systems, and that includes in hardware and software used by millions of businesses worldwide. The message is simple - even industry standard software and devices have their problems, and businesses have to keep track of that. There are two arms to ensure this is completed. Firstly, the business should have a cybersecurity officer in place whose role it is to monitor current measures and ensure they are kept up to date. Secondly, budget and time must be allocated at an executive level firstly to promote networking between the business and cybersecurity firms, and between partner businesses to ensure that even cybersecurity measures are implemented across the chain. Utilizing AI There is something of a digital arms race when it comes to artificial intelligence. As ZDNet notes, the lack of clear regulation is providing a lot of leeway for malicious actors to innovate, but for businesses to act, too. While regulations are now coming in, it remains that there is a clear role for AI in prevention. According t Hack Cloud ★★
The_State_of_Security.webp 2023-08-14 03:52:20 Les cinq étapes de la gestion de la vulnérabilité
The Five Stages of Vulnerability Management
(lien direct)
Un fort programme de gestion de la vulnérabilité sous-tend une stratégie de sécurité réussie dans l'ensemble.Après tout, vous ne pouvez pas défendre les points faibles que vous ne savez pas.Il est prévu que 2023 verra en moyenne 1 900 vulnérabilités et expositions communes critiques par mois, en hausse de 13% par rapport à l'année dernière.Cela est dû à une interconnexion accrue, à l'ajout de plus d'outils, de dispositifs IoT et de services SaaS et du risque accru d'erreur humaine.Avec autant de façons de laisser par inadvertance les pirates dans un réseau, la gestion de la vulnérabilité doit être un domaine de force de cybersécurité, pas de faiblesse, pour tout ...
A strong vulnerability management program underpins a successful security strategy overall. After all, you can\'t defend weak points you don\'t know are there. It is predicted that 2023 will see an average of 1,900 critical Common Vulnerabilities and Exposures (CVEs) a month, up 13% from last year. This is due to increased interconnectedness, the addition of more tools, IoT devices and SaaS services, and the increased risk of human error. With so many ways to inadvertently let hackers into a network, vulnerability management needs to be an area of cybersecurity strength, not weakness, for any...
Vulnerability Cloud ★★
CS.webp 2023-08-11 15:38:00 Cyber Sécurité du comité d'examen pour analyser la sécurité du cloud à la sillage de Microsoft Hack
Cyber Safety Review Board to analyze cloud security in wake of Microsoft hack
(lien direct)
> La décision intervient dans le sillage d'une violation chinoise de haut niveau des responsables américains \\ 'Microsoft Contacs.
>The decision comes in the wake of a high-profile Chinese breach of U.S. officials\' Microsoft email accounts.
Hack Cloud ★★
RecordedFuture.webp 2023-08-11 13:47:00 Microsoft Exchange Hack est le centre d'intervention de la prochaine revue de Cyber Board \\
Microsoft Exchange hack is focus of cyber board\\'s next review
(lien direct)
L'attaque liée à la Chine contre les services de courrier électronique Microsoft recevra un examen complet du conseil spécial du gouvernement américain pour l'examen des principaux incidents de cybersécurité, a déclaré vendredi le ministère de la Sécurité intérieure.Le Cyber Safety Review Board concentrera son attention sur «le ciblage malveillant des environnements de cloud computing», selon DHS , y compris la récente intrusion dans
The China-linked attack on Microsoft email services will get a full review by the U.S. government\'s special board for examining major cybersecurity incidents, the Department of Homeland Security said Friday. The Cyber Safety Review Board will focus its attention on “the malicious targeting of cloud computing environments,” according to DHS, including the recent intrusion into
Hack Cloud ★★
bleepingcomputer.webp 2023-08-11 13:35:52 US Cyber Safety Board pour analyser le piratage de Microsoft Exchange des e-mails Govt
US cyber safety board to analyze Microsoft Exchange hack of govt emails
(lien direct)
Le Cyber Sécurité du ministère de la Sécurité intérieure (CSRB) a annoncé son intention de procéder à un examen approfondi des pratiques de sécurité du cloud à la suite de récents hacks chinois de comptes d'échange Microsoft utilisés par les agences gouvernementales américaines.[...]
The Department of Homeland Security\'s Cyber Safety Review Board (CSRB) has announced plans to conduct an in-depth review of cloud security practices following recent Chinese hacks of Microsoft Exchange accounts used by US government agencies. [...]
Hack Cloud ★★
DarkReading.webp 2023-08-11 12:00:00 Mobb remporte la compétition de projecteurs de startup Black Hat
Mobb Wins Black Hat Startup Spotlight Competition
(lien direct)
Les quatre finalistes du concours de startup ont résolu les problèmes de sécurité du micrologiciel, d'infrastructure cloud, de logiciels open source et de remédiation de vulnérabilité.
The four finalists in the startup competition tackled problems in firmware security, cloud infrastructure, open source software, and vulnerability remediation.
Vulnerability Cloud ★★
DarkReading.webp 2023-08-11 02:31:00 Microsoft étend la gestion de la posture de sécurité cloud à Google Cloud
Microsoft Expands Cloud Security Posture Management to Google Cloud
(lien direct)
Microsoft Defender pour Cloud CSPM, qui fournit une surveillance des risques et de la conformité des AWS, Azure et sur site, ajoute enfin GCP au mélange.
Microsoft Defender for Cloud CSPM, which provides risk and compliance monitoring of AWS, Azure, and on-premises cloud, is finally adding GCP to the mix.
Cloud ★★
DarkReading.webp 2023-08-10 18:42:00 EvilProxy Cyberattack Flood cible les cadres via Microsoft 365
EvilProxy Cyberattack Flood Targets Execs via Microsoft 365
(lien direct)
Une campagne a envoyé 120 000 e-mails de phishing en trois mois, contournant le MFA pour compromettre les comptes cloud des cadres de haut niveau dans les organisations mondiales
A campaign sent 120,000 phishing emails in three months, circumventing MFA to compromise cloud accounts of high-level executives at global organizations
Cloud ★★
CVE.webp 2023-08-10 18:15:10 CVE-2023-39961 (lien direct) NextCloud Server fournit un stockage de données pour NextCloud, une plate-forme cloud open source.À partir de la version 24.0.4 et avant les versions 25.0.9, 26.0.4 et 27.0.1, lorsqu'un dossier avec des images ou une image a été partagé sans autorisation de téléchargement, l'utilisateur pourrait ajouter l'image en ligne dans un fichier texte et téléchargeril.Versions NextCloud Server 25.0.9, 26.0.4 et 27.0.1 et NextCloud Enterprise Server Versions 24.0.12.5, 25.0.9, 26.0.4 et 27.0.1 contiennent un correctif pour ce numéro.Aucune solution de contournement connue n'est disponible.
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 24.0.4 and prior to versions 25.0.9, 26.0.4, and 27.0.1, when a folder with images or an image was shared without download permissions, the user could add the image inline into a text file and download it. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
Cloud
CVE.webp 2023-08-10 18:15:10 CVE-2023-39959 (lien direct) NextCloud Server fournit un stockage de données pour NextCloud, une plate-forme cloud open source.À partir de la version 25.0.0 et avant les versions 25.0.9, 26.0.4 et 27.0.1, les utilisateurs non authentifiés pourraient envoyer une demande DAV qui révèle si un calendrier ou un carnet d'adresses avec l'identifiant donné existe pour la victime.Les versions NextCloud Server 25.0.9, 26.0.4 et 27.0.1 et NextCloud Enterprise Server Versions 25.0.9, 26.0.4 et 27.0.1 contiennent un correctif pour ce numéro.Aucune solution de contournement connue n'est disponible.
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.9, 26.0.4, and 27.0.1, unauthenticated users could send a DAV request which reveals whether a calendar or an address book with the given identifier exists for the victim. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
Cloud
CVE.webp 2023-08-10 18:15:10 CVE-2023-39962 (lien direct) NextCloud Server fournit un stockage de données pour NextCloud, une plate-forme cloud open source.À partir de la version 19.0.0 et avant les versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4 et 27.0.1, un utilisateur malveillantpourrait supprimer tout stockage externe personnel ou global, ce qui les rend également inaccessibles pour tout le monde.Versions NextCloud Server 25.0.9, 26.0.4 et 27.0.1 et NextCloud Enterprise Server Versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4 et 27.0.1 contiennent un correctif pour ce problème.En tant que solution de contournement, désactivez l'application Files_external.Cela rend également le stockage externe inaccessible mais conserve les configurations jusqu'à ce qu'une version corrigée soit déployée.
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 19.0.0 and prior to versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a malicious user could delete any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 19.0.13.10, 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. As a workaround, disable app files_external. This also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.
Cloud
CVE.webp 2023-08-10 18:15:10 CVE-2023-39963 (lien direct) NextCloud Server fournit un stockage de données pour NextCloud, une plate-forme cloud open source.À partir de la version 20.0.0 et avant les versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4 et 27.0.1, une confirmation de mot de passe manquante a permis un attaquant un attaquant, après avoir réussi à voler une session à un utilisateur connecté, pour créer des mots de passe d'applications pour la victime.Versions NextCloud Server 25.0.9, 26.0.4 et 27.0.1 et NextCloud Enterprise Server Versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4 et 27.0.1 Contiennent un correctif pour ce problème.Aucune solution de contournement connue n'est disponible.
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 20.0.0 and prior to versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, a missing password confirmation allowed an attacker, after successfully stealing a session from a logged in user, to create app passwords for the victim. Nextcloud server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 20.0.14.15, 21.0.9.13, 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
Cloud
CVE.webp 2023-08-10 18:15:09 CVE-2023-39958 (lien direct) NextCloud Server fournit un stockage de données pour NextCloud, une plate-forme cloud open source.À partir de la version 22.0.0 et avant les versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4 et 27.0.1, la protection manquante permet à un attaquant de forcer brute les secrets clients des clients configurés OAuth2.Les versions NextCloud Server 25.0.9, 26.0.4 et 27.0.1 et NextCloud Enterprise Server Versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4 et 27.0.1 contiennent un correctif pour ce problème.Aucune solution de contournement connue n'est disponible.
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1, missing protection allows an attacker to brute force the client secrets of configured OAuth2 clients. Nextcloud Server versions 25.0.9, 26.0.4, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.5, 25.0.9, 26.0.4, and 27.0.1 contain a patch for this issue. No known workarounds are available.
Cloud
The_Hackers_News.webp 2023-08-10 16:44:00 Emerging Attaper Exploit: Microsoft Cross-Renant Synchronisation
Emerging Attacker Exploit: Microsoft Cross-Tenant Synchronization
(lien direct)
Les attaquants continuent de cibler les identités Microsoft pour accéder aux applications Microsoft connectées et aux applications SAAS fédérées.De plus, les attaquants continuent de progresser leurs attaques dans ces environnements, non pas en exploitant les vulnérabilités, mais en abusant de la fonctionnalité native de Microsoft pour atteindre leur objectif.Le groupe d'attaquant Nobelium, lié aux attaques de Solarwinds, a été
Attackers continue to target Microsoft identities to gain access to connected Microsoft applications and federated SaaS applications. Additionally, attackers continue to progress their attacks in these environments, not by exploiting vulnerabilities, but by abusing native Microsoft functionality to achieve their objective. The attacker group Nobelium, linked with the SolarWinds attacks, has been
Cloud Solardwinds ★★
CVE.webp 2023-08-10 15:15:09 CVE-2023-39954 (lien direct) User_OIDC fournit le backend utilisateur OIDC Connect pour NextCloud, une plate-forme cloud open source.À partir de la version 1.0.0 et avant la version 1.3.3, un attaquant qui a obtenu au moins l'accès en lecture à un instantané de la base de données peut usurrer le serveur NextCloud vers des serveurs liés.User_OIDC 1.3.3 contient un patch.Aucune solution de contournement connue n'est disponible.
user_oidc provides the OIDC connect user backend for Nextcloud, an open-source cloud platform. Starting in version 1.0.0 and prior to version 1.3.3, an attacker that obtained at least read access to a snapshot of the database can impersonate the Nextcloud server towards linked servers. user_oidc 1.3.3 contains a patch. No known workarounds are available.
Cloud
CVE.webp 2023-08-10 15:15:09 CVE-2023-39955 (lien direct) Notes est une application de prise de notes pour NextCloud, une plate-forme cloud open source.À partir de la version 4.4.0 et avant la version 4.8.0, lors de la création d'un fichier de notes avec HTML, le contenu est rendu dans l'aperçu au lieu que le fichier soit proposé à télécharger.NextCloud Remarques La version 4.8.0 contient un correctif pour le problème.Aucune solution de contournement connue n'est disponible.
Notes is a note-taking app for Nextcloud, an open-source cloud platform. Starting in version 4.4.0 and prior to version 4.8.0, when creating a note file with HTML, the content is rendered in the preview instead of the file being offered to download. Nextcloud Notes app version 4.8.0 contains a patch for the issue. No known workarounds are available.
Cloud
CVE.webp 2023-08-10 14:15:15 CVE-2023-39952 (lien direct) NextCloud Server fournit un stockage de données pour NextCloud, une plate-forme cloud open source.À partir de la version 22.0.0 et avant les versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3 et 27.0.1, un utilisateur peut accéder à des fichiers à l'intérieur d'un sous-dossier d'un groupe de groupe accessible,Même si les autorisations avancées bloqueraient l'accès au sous-dossier.Les versions NextCloud Server 25.0.8, 26.0.3 et 27.0.1 et NextCloud Enterprise Server Versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3 et 27.0.1 contiennent un correctif pour ce problème.Aucune solution de contournement connue n'est disponible.
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 22.0.0 and prior to versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1, a user can access files inside a subfolder of a groupfolder accessible to them, even if advanced permissions would block access to the subfolder. Nextcloud Server versions 25.0.8, 26.0.3, and 27.0.1 and Nextcloud Enterprise Server versions 22.2.10.13, 23.0.12.8, 24.0.12.4, 25.0.8, 26.0.3, and 27.0.1 contain a patch for this issue. No known workarounds are available.
Cloud
CVE.webp 2023-08-10 14:15:15 CVE-2023-39953 (lien direct) User_OIDC fournit le backend utilisateur OIDC Connect pour NextCloud, une plate-forme cloud open source.À partir de la version 1.0.0 et avant la version 1.3.3, la vérification manquante de l'émetteur aurait permis à un attaquant d'effectuer une attaque de l'homme au milieu de retour corrompu ou connu auquel ils ont également accès.User_OIDC 1.3.3 contient un patch.Aucune solution de contournement connue n'est disponible.
user_oidc provides the OIDC connect user backend for Nextcloud, an open-source cloud platform. Starting in version 1.0.0 and prior to version 1.3.3, missing verification of the issuer would have allowed an attacker to perform a man-in-the-middle attack returning corrupted or known token they also have access to. user_oidc 1.3.3 contains a patch. No known workarounds are available.
Cloud
PaloAlto.webp 2023-08-10 13:00:20 Deloitte sauvegarde le cycle de vie du développement du logiciel
Deloitte Safeguards Software Development Lifecycle
(lien direct)
> Palo Alto Networks et Deloitte ont une nouvelle offre SSDL pour renforcer les environnements cloud des clients avec des mesures de sécurité améliorées du code au cloud.
>Palo Alto Networks and Deloitte have a new SSDL offering to reinforce customers\' cloud environments with enhanced security measures from code to cloud.
Cloud Deloitte ★★
AlienVault.webp 2023-08-10 10:00:00 Les systèmes Mac se sont transformés en nœuds de sortie proxy par adcharge
Mac systems turned into proxy exit nodes by AdLoad
(lien direct)
This blog was jointly written by Fernando Martinez Sidera and Ofer Caspi, AT&T Alien Labs threat intelligence researchers. Executive summary  AdLoad malware is still infecting Mac systems years after its first appearance in 2017. AdLoad, a package bundler, has been observed delivering a wide range of payloads throughout its existence. During AT&T Alien Labs’ investigation of its most recent payload, it was discovered that the most common component dropped by AdLoad during the past year has been a proxy application turning MacOS AdLoad victims into a giant, residential proxy botnet. Key takeaways:  AdLoad malware is still present and infecting systems, with a previously unreported payload. At least 150 samples have been observed in the wild during the last year. AT&T Alien Labs has observed thousands of IPs behaving as proxy exit nodes in a manner similar to AdLoad infected systems. This behavior could indicate that thousands of Mac systems have been hijacked to act as proxy exit nodes. The samples analyzed in this blog are unique to MacOS, but Windows samples have also been observed in the wild. Analysis  AdLoad is one of several widespread adware and bundleware loaders currently impacting macOS. The OSX malware has been present since 2017, with big campaigns in the last two years as reported by SentinelOne in 2021 and Microsoft in 2022. As stated in Microsoft’s report on UpdateAgent, a malware delivering AdLoad through drive-by compromise, AdLoad redirected users’ traffic through the adware operators’ servers, injecting advertisements and promotions into webpages and search results with a Person-in-The-Middle (PiTM) attack. These two previous campaigns, together with the campaign described in this blog, support the theory that AdLoad could be running a pay-per-Install campaign in the infected systems. The main purpose of the malware has always been to act as a downloader for subsequent payloads. It has been identified delivering a wide range of payloads (adware, bundleware, PiTM, backdoors, proxy applications, etc.) every few months to a year, sometimes conveying different payloads depending on the system settings such as geolocation, device make and model, operating system version, or language settings, as reported by SentinelOne. In all observed samples, regardless of payload, they report an Adload server during execution on the victim’s system. This beacon (analyzed later in Figure 3 & 4) includes system information in the user agent and the body, without any relevant response aside from a 200 HTTP response code. This activity probably represents AdLoad\'s method of keeping count of the number of infected systems, supporting the pay-per-Install scheme. AT&T Alien Labs™ has observed similar activity in our threat analysis systems throughout the last year, with the AdLoad malware being installed in the infected systems. However, Alien Labs is now observing a previously unreported payload being delivered to the victims. The payload corresponds to a proxy application, converting its targets into proxy exit nodes after infection. As seen in Figure 1, the threat actors behind this campaign have been very active since the beginning of 2022. bar chart of AdLoad samples Figure 1. Histogram of AdLoad samples identified by Alien Labs. The vast numb Spam Malware Threat Cloud APT 32 ★★
DarkReading.webp 2023-08-09 21:33:00 Sweet Security atterrit 12 millions de dollars de financement de semences pour changer de sécurité cloud à droite
Sweet Security Lands $12M in Seed Funding to Shift Cloud Security Right
(lien direct)
This blog was jointly written by Fernando Martinez Sidera and Ofer Caspi, AT&T Alien Labs threat intelligence researchers. Executive summary  AdLoad malware is still infecting Mac systems years after its first appearance in 2017. AdLoad, a package bundler, has been observed delivering a wide range of payloads throughout its existence. During AT&T Alien Labs’ investigation of its most recent payload, it was discovered that the most common component dropped by AdLoad during the past year has been a proxy application turning MacOS AdLoad victims into a giant, residential proxy botnet. Key takeaways:  AdLoad malware is still present and infecting systems, with a previously unreported payload. At least 150 samples have been observed in the wild during the last year. AT&T Alien Labs has observed thousands of IPs behaving as proxy exit nodes in a manner similar to AdLoad infected systems. This behavior could indicate that thousands of Mac systems have been hijacked to act as proxy exit nodes. The samples analyzed in this blog are unique to MacOS, but Windows samples have also been observed in the wild. Analysis  AdLoad is one of several widespread adware and bundleware loaders currently impacting macOS. The OSX malware has been present since 2017, with big campaigns in the last two years as reported by SentinelOne in 2021 and Microsoft in 2022. As stated in Microsoft’s report on UpdateAgent, a malware delivering AdLoad through drive-by compromise, AdLoad redirected users’ traffic through the adware operators’ servers, injecting advertisements and promotions into webpages and search results with a Person-in-The-Middle (PiTM) attack. These two previous campaigns, together with the campaign described in this blog, support the theory that AdLoad could be running a pay-per-Install campaign in the infected systems. The main purpose of the malware has always been to act as a downloader for subsequent payloads. It has been identified delivering a wide range of payloads (adware, bundleware, PiTM, backdoors, proxy applications, etc.) every few months to a year, sometimes conveying different payloads depending on the system settings such as geolocation, device make and model, operating system version, or language settings, as reported by SentinelOne. In all observed samples, regardless of payload, they report an Adload server during execution on the victim’s system. This beacon (analyzed later in Figure 3 & 4) includes system information in the user agent and the body, without any relevant response aside from a 200 HTTP response code. This activity probably represents AdLoad\'s method of keeping count of the number of infected systems, supporting the pay-per-Install scheme. AT&T Alien Labs™ has observed similar activity in our threat analysis systems throughout the last year, with the AdLoad malware being installed in the infected systems. However, Alien Labs is now observing a previously unreported payload being delivered to the victims. The payload corresponds to a proxy application, converting its targets into proxy exit nodes after infection. As seen in Figure 1, the threat actors behind this campaign have been very active since the beginning of 2022. bar chart of AdLoad samples Figure 1. Histogram of AdLoad samples identified by Alien Labs. The vast numb Cloud
globalsecuritymag.webp 2023-08-09 19:26:08 Les écoles sont plus à risque de cyberattaques que jamais auparavant & # 8211;Nouveau rapport de cybersécurité K-12
Schools are at a Greater Risk for Cyber Attacks Than Ever Before – New K-12 Cybersecurity Report
(lien direct)
Les écoles courent un plus grand risque de cyberattaques que jamais auparavant & # 8211;Nouveau rapport de cybersécurité K-12 Rapport de la société de sécurité du Cloud Zero Trust Edge Iboss et du projet à but non lucratif de l'éducation Tomorrow révèle que le manque de collaboration dans les écoles contribue à l'augmentation du cyber-risque. Plus de 84% des chefs de district et des administrateurs conviennent que les écoles K-12 sont plus à risque de cyberattaques que jamais. - rapports spéciaux
Schools are at a Greater Risk for Cyber Attacks Than Ever Before – New K-12 Cybersecurity Report Report from Leading Zero Trust Edge Cloud Security Company iboss and education nonprofit Project Tomorrow Reveals Lack of Collaboration in Schools is Contributing to Increased Cyber Risk. More than 84% of District Leaders and Administrators Agree That K-12 Schools are at a Higher Risk for Cyber Attacks than Ever Before. - Special Reports
Cloud ★★
CVE.webp 2023-08-09 17:15:09 CVE-2023-39531 (lien direct) Sentry est une plate-forme de suivi des erreurs et de surveillance des performances.À partir de la version 10.0.0 et avant la version 23.7.2, un attaquant avec des exploits côté client suffisants pourrait récupérer un jeton d'accès valide pour un autre utilisateur lors de l'échange de jetons OAuth en raison d'une validation d'identification incorrecte.L'ID client doit être connu et l'application API doit déjà avoir été autorisée sur le compte utilisateur ciblé.Les clients Sentry SaaS n'ont pas besoin de prendre aucune mesure.Les installations auto-hébergées doivent passer à la version 23.7.2 ou plus.Il n'y a pas de contournement direct, mais les utilisateurs doivent examiner les applications autorisées sur leur compte et en supprimer qui ne sont plus nécessaires.
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. Sentry SaaS customers do not need to take any action. Self-hosted installations should upgrade to version 23.7.2 or higher. There are no direct workarounds, but users should review applications authorized on their account and remove any that are no longer needed.
Cloud
DarkReading.webp 2023-08-09 16:26:00 Sweet Security débute la gestion de l'exécution pour le cloud
Sweet Security Debuts Runtime Management for Cloud
(lien direct)
Les outils de détection existants fournissent des fonctionnalités limitées ou sont optimisées pour le cloud, affirme les startups israéliennes.
Existing detection tools either provide limited functionality or aren\'t optimized for the cloud, Israeli startup claims.
Tool Cloud ★★
Cybereason.webp 2023-08-09 13:00:00 Étendre la détection et la réponse des nuages avec Sysdig et Cybearon
Extend Cloud Detection and Response with Sysdig and Cybereason
(lien direct)

Extend Cloud Detection and Response with Sysdig and Cybereason
Cloud ★★
DarkReading.webp 2023-08-09 12:45:00 Contrôlant les lacunes de la couverture où les ressources des clients répondent aux environnements cloud
Closing Coverage Gaps Where Customer Resources Meet Cloud Environments
(lien direct)
La protection des espaces où les nuages privés, publics et hybrides rencontrent les technologies des utilisateurs \\ 'nécessite une approche centrée sur le cloud.
Protecting the spaces where private, public, and hybrid clouds meet users\' technologies requires a cloud-centric approach.
Cloud ★★
globalsecuritymag.webp 2023-08-09 07:48:15 Rubrik acquiert Laminar (lien direct) Rubrik acquiert le leader du DSPM Laminar pour accélérer la sécurité des données dans le cloud Avec cette acquisition, le spécialiste de la sécurité des données Zéro Trust veut unifier la sécurité des données au sein de l'entreprise, du cloud et du SaaS afin d'assurer la cyber-résilience. Rubrik annonce une intention d'ouverture d'un nouveau centre R&D en Israël avec Laminar pour stimuler l'innovation en matière de cybersécurité. - Business Cloud ★★
CVE.webp 2023-08-09 03:15:43 CVE-2023-39341 (lien direct) "FFRI Yarai", "FFRI Yarai Home and Business Edition" et leurs produits OEM gèrent mal les conditions exceptionnelles, ce qui peut conduire à un état de déni de service (DOS). Les produits et versions affectés sont les suivants: FFRI YARAI Versions 3.4.0 à 3.4.6 et 3.5.0, FFRI Yarai Home and Business Edition version 1.4.0, Infotrace Mark II Malware Protection (Mark II Zerona) Versions 3.0.1 à 3.2.2, Versions Zerona / Zerona Plus 3.2.32 à 3.2.36, ActSecure?Versions 3.4.0 à 3.4.6 et 3.5.0, Dual SAFED PORTÉE PAR FFRI YARAI Version 1.4.1, EDR Plus Pack (versions FFRI YARAI FFRI 3.4.0 à 3.4.6 et 3.5.0) et Edr Plus Pack Cloud(Versions FFRI Yarai groupées 3.4.0 à 3.4.6 et 3.5.0).
"FFRI yarai", "FFRI yarai Home and Business Edition" and their OEM products handle exceptional conditions improperly, which may lead to denial-of-service (DoS) condition. Affected products and versions are as follows: FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0, FFRI yarai Home and Business Edition version 1.4.0, InfoTrace Mark II Malware Protection (Mark II Zerona) versions 3.0.1 to 3.2.2, Zerona / Zerona PLUS versions 3.2.32 to 3.2.36, ActSecure ? versions 3.4.0 to 3.4.6 and 3.5.0, Dual Safe Powered by FFRI yarai version 1.4.1, EDR Plus Pack (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0), and EDR Plus Pack Cloud (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0).
Malware Cloud
Google.webp 2023-08-09 00:33:56 GCP-2023-025 (lien direct) Publié: Cloud
The_State_of_Security.webp 2023-08-09 00:19:18 Les 5 principales certifications de sécurité cloud neutres du fournisseur de 2023
The Top 5 Vendor-Neutral Cloud Security Certifications of 2023
(lien direct)
Tous les segments du marché du cloud devraient voir la croissance en 2023, selon des recherches de Gartner.Dans un communiqué de presse en avril, l'entreprise prévoit que les dépenses mondiales sur les services de cloud public dépasseront 21% cette année, totalisant 597,3 milliards de dollars au total en 2023. Cela augmente plus de 100 milliards de dollars par rapport à 491 milliards de dollars.«Les organisations considèrent aujourd'hui le cloud comme une plate-forme très stratégique pour la transformation numérique, ce qui oblige les fournisseurs de cloud à offrir des capacités plus sophistiquées à mesure que la concurrence pour les services numériques se réchauffe», note Sid Nag, vice-président analyste chez Gartner ...
All segments of the cloud market are predicted to see growth in 2023, according to research by Gartner. In an April Press Release, the firm forecasts that global spending on public cloud services will exceed 21% this year, totaling $597.3 billion overall in 2023. This is up over $100 billion from last year\'s (mere) $491 billion. “Organizations today view cloud as a highly strategic platform for digital transformation, which is requiring cloud providers to offer more sophisticated capabilities as the competition for digital services heats up,” notes Sid Nag, Vice President Analyst at Gartner...
Cloud ★★★
DarkReading.webp 2023-08-08 21:30:00 Brillio s'associe à Google Cloud pour construire des solutions d'IA génératives pour les services financiers et les industries de la santé
Brillio Partners With Google Cloud to Build Generative AI Solutions for the Financial Services and Healthcare Industries
(lien direct)
Tous les segments du marché du cloud devraient voir la croissance en 2023, selon des recherches de Gartner.Dans un communiqué de presse en avril, l'entreprise prévoit que les dépenses mondiales sur les services de cloud public dépasseront 21% cette année, totalisant 597,3 milliards de dollars au total en 2023. Cela augmente plus de 100 milliards de dollars par rapport à 491 milliards de dollars.«Les organisations considèrent aujourd'hui le cloud comme une plate-forme très stratégique pour la transformation numérique, ce qui oblige les fournisseurs de cloud à offrir des capacités plus sophistiquées à mesure que la concurrence pour les services numériques se réchauffe», note Sid Nag, vice-président analyste chez Gartner ...
All segments of the cloud market are predicted to see growth in 2023, according to research by Gartner. In an April Press Release, the firm forecasts that global spending on public cloud services will exceed 21% this year, totaling $597.3 billion overall in 2023. This is up over $100 billion from last year\'s (mere) $491 billion. “Organizations today view cloud as a highly strategic platform for digital transformation, which is requiring cloud providers to offer more sophisticated capabilities as the competition for digital services heats up,” notes Sid Nag, Vice President Analyst at Gartner...
Cloud ★★
Netskope.webp 2023-08-08 18:33:07 Statistiques de laboratoire de menace de netskope pour juillet 2023
Netskope Threat Labs Stats for July 2023
(lien direct)
> Netskope Threat Labs publie un article de blog de résumé mensuel des principales menaces que nous suivons sur la plate-forme Netskope.Le but de cet article est de fournir des renseignements stratégiques et exploitables sur les menaces actives contre les utilisateurs d'entreprise du monde entier.Les attaquants récapitulatifs continuent de tenter de voler sous le radar en utilisant des applications cloud pour fournir des logiciels malveillants, [& # 8230;]
>Netskope Threat Labs publishes a monthly summary blog post of the top threats we are tracking on the Netskope platform. The purpose of this post is to provide strategic, actionable intelligence on active threats against enterprise users worldwide. Summary Attackers continue to attempt to fly under the radar by using cloud apps to deliver malware, […]
Threat Cloud ★★★
CVE.webp 2023-08-08 18:15:16 CVE-2023-36904 (lien direct) Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnérabilité
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Vulnerability Cloud
Google.webp 2023-08-08 16:41:49 GCP-2023-024 (lien direct) Publié: 2023-08-08 Description Description Gravité notes Intel a révélé une vulnérabilité dans certains processeurs (CVE-2022-40982).Google a pris des mesures pour atténuer sa flotte de serveurs, y compris Google Cloud, pour s'assurer que les clients sont protégés. Les détails de la vulnérabilité: CVE-2022-40982 (Intel IPU 2023.3, "Gds" aka "chute") que dois-je faire? Aucune action client n'estrequis. Tous les correctifs disponibles ont déjà été appliqués à la flotte Google Server pour Google Cloud, y compris le moteur Google Compute. Pour le moment, les produits suivants nécessitent des mises à jour supplémentaires de partenaires etvendeurs. Moteur Google Cloud VMware Google distribué le cloud hébergé Google distribué Cloud Edge Solution de métal nus de Google Cloud Core de paquet évolué Google remédiera à ces produits une fois que ces correctifs auront été mis à disposition, et ce bulletin sera mis à jour en conséquence. Google Chromebook et Chromeos FlexLes clients ont automatiquement reçu les atténuations fournies par Intel en stable (115), bêta (116) et LTC (114).Chromebook et Chromeos Flex que les clients épinglés à une version plus ancienne devraient envisager de permettre et de passer à des versions stables ou LTS pour s'assurer qu'ils reçoivent ce correctif et d'autres correctifs de vulnérabilité. Quelles vulnérabilités sont traitées? CVE-2022-40982 - Pour plus d'informations, voir Intel Security Advisory Intel-SA-00828 . High CVE-2022-40982
Published: 2023-08-08Description Description Severity Notes Intel disclosed a vulnerability in select processors (CVE-2022-40982). Google has taken steps to mitigate its server fleet, including Google Cloud, to ensure customers are protected. The vulnerability details: CVE-2022-40982 (Intel IPU 2023.3, "GDS" aka "Downfall") What should I do?No customer action is required. All available patches have already been applied to the Google server fleet for Google Cloud, including Google Compute Engine. At this time, the following products require additional updates from partners and vendors. Google Cloud VMware Engine Google Distributed Cloud Hosted Google Distributed Cloud Edge Google Cloud Bare Metal Solution Evolved Packet Core Google will remediate these products once these patches have been made available, and this bulletin will be updated accordingly. Google Chromebook and ChromeOS Flex customers automatically received the Intel provided mitigations in Stable (115), Beta (116), and LTC (114). Chromebook and ChromeOS Flex customers pinned to an older release should consider unpinning and moving to Stable or LTS releases to ensure they receive this and other vulnerability fixes. What vulnerabilities are being addressed? CVE-2022-40982 - For more information, see Intel Security Advisory INTEL-SA-00828. High CVE-2022-409
Vulnerability Cloud
GoogleSec.webp 2023-08-08 13:33:00 Chute et zenbleed: Googlers aide à sécuriser l'écosystème
Downfall and Zenbleed: Googlers helping secure the ecosystem
(lien direct)
Tavis Ormandy, Software Engineer and Daniel Moghimi, Senior Research ScientistFinding and mitigating security vulnerabilities is critical to keeping Internet users safe.  However, the more complex a system becomes, the harder it is to secure-and that is also the case with computing hardware and processors, which have developed highly advanced capabilities over the years. This post will detail this trend by exploring Downfall and Zenbleed, two new security vulnerabilities (one of which was disclosed today) that prior to mitigation had the potential to affect billions of personal and cloud computers, signifying the importance of vulnerability research and cross-industry collaboration. Had these vulnerabilities not been discovered by Google researchers, and instead by adversaries, they would have enabled attackers to compromise Internet users. For both vulnerabilities, Google worked closely with our partners in the industry to develop fixes, deploy mitigations and gather details to share widely and better secure the ecosystem.What are Downfall and Zenbleed?Downfall (CVE-2022-40982) and Zenbleed (CVE-2023-20593) are two different vulnerabilities affecting CPUs - Intel Core (6th - 11th generation) and AMD Zen2, respectively. They allow an attacker to violate the software-hardware boundary established in modern processors. This could allow an attacker to access data in internal hardware registers that hold information belonging to other users of the system (both across different virtual machines and different processes). These vulnerabilities arise from complex optimizations in modern CPUs tha Vulnerability Prediction Cloud ★★
Dragos.webp 2023-08-08 12:00:00 Dragos, un partenaire AWS, annonce la disponibilité de la plate-forme Dragos dans AWS Marketplace pour sécuriser et gérer les systèmes de contrôle industriel (ICS) Cyber Risk
Dragos, an AWS Partner, Announces the Availability of the Dragos Platform in AWS Marketplace to Secure and Manage Industrial Control Systems (ICS) Cyber Risk
(lien direct)
> Pour les organisations industrielles en électricité, en pétrole et en gaz et en fabrication, les services cloud et les migrations ont le potentiel de débloquer de nouveaux ... Le post dragos, un partenaire AWS, annonce la disponibilité de la plate-forme dragos dans AWSMarketplace pour sécuriser et gérer les systèmes de contrôle industriel (ICS) Cyber Risk est apparu pour la première fois sur dragos .
>For industrial organizations in electric, oil and gas, and manufacturing, cloud services and migrations have the potential to unlock new... The post Dragos, an AWS Partner, Announces the Availability of the Dragos Platform in AWS Marketplace to Secure and Manage Industrial Control Systems (ICS) Cyber Risk first appeared on Dragos.
Industrial Cloud ★★★
globalsecuritymag.webp 2023-08-08 09:06:35 10 minutes suffisent pour lancer une cyberattaque selon Sysdig (lien direct) 10 minutes suffisent pour lancer une cyberattaque selon Sysdig Le Sysdig Global Cloud Threat Report 2023, rapport sur la sécurité dans le cloud, montre qu'il s'écoule 10 minutes entre le phishing et l'attaque. - Investigations Threat Cloud ★★
CVE.webp 2023-08-08 07:15:10 CVE-2023-3569 (lien direct) Dans Phoenix Contacts TC Router et TC Cloud Client dans les versions avant 2.07.2 ainsi que Cloud Client 1101T-TX / TX avant 2.06.10 Un attaquant distant authentifié avec les privilèges d'administration pourrait télécharger un fichier XML conçu qui provoque un déni de déni de déni de déni-service.
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service.
Cloud
CVE.webp 2023-08-08 07:15:10 CVE-2023-3526 (lien direct) Dans Phoenix Contacts TC Router et TC Cloud Client dans les versions avant 2.07.2 ainsi que Cloud Client 1101T-TX / TX Avant 2.06.10 Un attaquant distant non authentifié pourrait utiliser un XSS réfléchissant dans la page de la visionneuse de licence des périphériques dans l'ordre dans l'ordrePour exécuter du code dans le contexte du navigateur de l'utilisateur \\.
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an unauthenticated remote attacker could use a reflective XSS within the license viewer page of the devices in order to execute code in the context of the user\'s browser.
Cloud
CVE.webp 2023-08-08 01:15:19 CVE-2023-39439 (lien direct) SAP Commerce Cloud peut accepter une phrase de passe vide pour l'ID utilisateur et l'authentification en phrase de passe, permettant aux utilisateurs de se connecter au système sans phrase de passe.
SAP Commerce Cloud may accept an empty passphrase for user ID and passphrase authentication, allowing users to log into the system without a passphrase.
Cloud
CVE.webp 2023-08-07 20:15:09 CVE-2023-39520 (lien direct) Cryptomator chiffre les données stockées sur l'infrastructure cloud.Le programme d'installation MSI fourni sur la page d'accueil pour Cryptomator version 1.9.2 permet l'escalade locale de privilèges pour les utilisateurs privilégiés faibles, via la fonction «Réparation».Le problème se produit car la fonction de réparation du MSI repousse un système de puissance du système sans le paramètre «-Noprofile».Par conséquent, le profil de l'utilisateur commençant la réparation sera chargé.La version 1.9.3 contient un correctif pour ce problème.L'ajout d'un `-noprofile» au PowerShell est une solution de contournement possible.
Cryptomator encrypts data being stored on cloud infrastructure. The MSI installer provided on the homepage for Cryptomator version 1.9.2 allows local privilege escalation for low privileged users, via the `repair` function. The problem occurs as the repair function of the MSI is spawning an SYSTEM Powershell without the `-NoProfile` parameter. Therefore the profile of the user starting the repair will be loaded. Version 1.9.3 contains a fix for this issue. Adding a `-NoProfile` to the powershell is a possible workaround.
Cloud
AlienVault.webp 2023-08-07 10:00:00 Ce qui peut se cacher derrière ce code QR
What may be lurking behind that QR code
(lien direct)
QR code on iPhone being scanned As we go about our daily lives, whether that be shopping with the family, enjoying dinner at a restaurant, finding our gate at the airport, or even watching TV, we find ourselves more and more often encountering the QR code. These black-and-white checkerboards of sorts have gained a reputation for being a fast and convenient way of obtaining information via our smartphones while at the same time contributing to environmental conservation, as they allow businesses such as retailers and restaurants to print fewer paper menus or flyers. But before you whip out that phone and activate your camera, you should be aware that these seemingly innocuous QR codes can also be used for purposes you aren’t anticipating. Adversaries can also abuse them to steal your money, identity, or other data.  In fact, the term in the cybersecurity industry for attacks that leverage QR codes as a means of delivery is “quishing.” Although this may sound cute, the intentions behind these intrusions are, in reality, quite sinister. A brief history of the QR code While it may seem like we have only been interacting with QR codes over the past several years, they were in fact invented almost 30 years ago in 1994 by a Japanese company called Denso Wave, a subsidiary of Toyota Motor Corporation, for the purposes of tracking automotive parts in the assembly process. QR stands for “quick response” and is a sophisticated type of bar code that utilizes a square pattern containing even smaller black and white squares that represent numbers, letters, or even non-Latin scripts which can be scanned into a computer system. Have you ever noticed that there are larger black and white squares in just three of the corners of a QR code? Their purpose is to allow a scanning device to determine the code’s orientation, regardless of how it may be turned. The use of QR codes has expanded considerably since 1994. They have become a favored means for businesses to circulate marketing collateral or route prospects to web forms, and other even more creative uses have also been cultivated. Instead of printing resource-consuming user manuals, manufacturers may direct their consumers to web-hosted versions that can be reached by scanning codes printed on the packaging materials. Event venues print QR codes on tickets that can be scanned upon entry to verify validity, and museums post signs next to exhibits with QR codes for visitors to obtain more information. During the COVID-19 pandemic, the use of QR codes accelerated as organizations sought to create contactless methods of doing business. The dangers that lie beneath QR codes don’t appear to be going away anytime soon. The speed, and versatility they offer is hard to deny. However, any hacker worth their salt understands that the most effective attacks leverage social engineering to prey upon human assumptions or habits. We’ve become accustomed to scanning QR codes to quickly transact or to satisfy our sense of curiosity, but this convenience can come at a cost. There are several websites that make it incredibly simple and low cost (or free) for cybercriminals to generate QR codes, which they can use to do any of the following: Open a spoofed web page – Upon scanning the QR code, your browser will open a fake web page that appears to be a legitimate business, such as a bank or e-commerce site, where you are requested to provide login credentials or payment data, also known as a phishing attack. It is also possible that this site contains links to malware. Recommend an unscrupulous app – You will be directed to a particular app on the Apple App or Google Play Store and given the option to download the app to your mobile device. These apps can contain malware that installs additi Spam Malware Threat Cloud ★★★
RecordedFuture.webp 2023-08-04 22:00:00 Microsoft résout la vulnérabilité après la critique du PDG tenable
Microsoft resolves vulnerability following criticism from Tenable CEO
(lien direct)
Microsoft a résolu une vulnérabilité qui permet aux acteurs de menace d'accéder aux informations gérées par Azure AD, une offre cloud utilisée par les grandes entreprises pour gérer l'authentification des utilisateurs.Les préoccupations concernant la question ont fait irruption dans le public cette semaine quand Amit Yoran, PDG de la société de cybersécurité Tenable, a publié un post linkedin cinglant
Microsoft has resolved a vulnerability that allows threat actors to gain access to information managed by Azure AD, a cloud offering used by large companies for managing user authentication. Concerns about the issue burst into public view this week when Amit Yoran, the CEO of cybersecurity firm Tenable, published a scathing LinkedIn post bashing the
Vulnerability Threat Cloud ★★★★
Last update at: 2024-05-09 03:07:47
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter