Elusive Sandman APT Targets Telecom Giants With LuaJIT Toolkit

Read Time:4 Second

SentinelLabs said the group’s tactics focus on stealthy lateral movements and minimal interactions

Read More

CVE-2022-4039

Read Time:15 Second

A flaw was found in Red Hat Single Sign-On for OpenShift container images, which are configured with an unsecured management interface enabled. This flaw allows an attacker to use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.

Read More

CVE-2022-3874

Read Time:13 Second

A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary command execution on the underlying operating system.

Read More

Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution

Read Time:51 Second

Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution.

iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch.
iPadOS is the successor to iOS 12 and is a mobile operating system for iPads.
macOS Ventura is the 19th and current major release of macOS
macOS Monterey is the 18th major release of macOS
watchOS is the mobile operating system for Apple Watch and is based on the iOS operating system.
Safari is a web browser developed by Apple
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Read More

A Vulnerability in Drupal Could Allow for Privilege Escalation

Read Time:17 Second

A vulnerability has been discovered in Drupal that could allow for privilege escalation. Drupal is an open source content management platform supporting a variety of websites ranging from personal weblogs to large community-driven websites. Successful exploitation of this vulnerability may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation.

Read More