Artwork

内容由Paul Torgersen提供。所有播客内容(包括剧集、图形和播客描述)均由 Paul Torgersen 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

HP broken BIOS, New Nerbian, Konica cure, and more.

2:41
 
分享
 

已归档的系列专辑 ("不活跃的收取点" status)

When? This feed was archived on May 25, 2023 16:09 (10M ago). Last successful fetch was on July 29, 2022 18:35 (1+ y ago)

Why? 不活跃的收取点 status. 我们的伺服器已尝试了一段时间,但仍然无法截取有效的播客收取点

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 328278259 series 2478053
内容由Paul Torgersen提供。所有播客内容(包括剧集、图形和播客描述)均由 Paul Torgersen 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
A daily look at the relevant information security news from overnight.
Episode 237 - 12 May 2022
HP broken BIOS - https://www.bleepingcomputer.com/news/security/hp-fixes-bug-letting-attackers-overwrite-firmware-in-over-200-models/
New Nerbian -
https://threatpost.com/nerbian-rat-advanced-trick/179600/
Bitter at Bangladesh - https://www.bleepingcomputer.com/news/security/bitter-cyberspies-target-south-asian-govts-with-new-malware/
Fake Vanity - https://portswigger.net/daily-swig/box-zoom-google-docs-offer-phishing-boost-with-vanity-url-flaws
Konica cure- https://www.securityweek.com/konica-minolta-printers-vulnerable-hacking-physical-access
Hi, I’m Paul Torgersen. It’s Thursday May 12th, 2022, and this is a look at the information security news from overnight.
From BleepingComputer.com:
HP has released BIOS updates to fix two 8.8 severity vulnerabilities that would allow code to run with Kernel privileges, and affects over 200 PC and notebook products. The problem appears to be that an SMI handler can be triggered from the OS environment. You can see the details and a couple important links in the article.
From ThreatPost.com:
A newly discovered and complex remote access trojan dubbed Nerbian RAT, is spreading via malicious email campaigns using COVID-19 as a lure. This multi-feature baddie, including the ability to evade analysis or detection by researchers. The majority of the attacks have been centered in Spain and the United Kingdom.
From BleepingComputer.com:
APT cyberespionage group Bitter has been found targeting the government of Bangladesh with a new malware with remote file execution capabilities. These messages are sent via spoofed email addresses that appear to come from Pakistani government organizations. This was likely possible by exploiting a flaw in the Zimbra mail server that allows attackers to send messages from a non-existent mail domain. Full details from the Talos research in the article.
From PortSwigger.net:
Threat actors are enhancing their phishing campaigns by exploiting a failure to validate subdomains within so-called ‘vanity URLs’ used in SaaS applications. Apps such as Box, Zoom, and Google Docs validate vanity URLs’ URI (the unique sequence of characters at the end of the link), but not its descriptive subdomain, which is the portion preceding the URI.
And last today, from SecurityWeek.com:
Hundreds of thousands of Konica printers are vulnerable to hacking via ​​physical access. The vendor produced firmware and operating system patches in early 2020, but details are only being disclosed now because in many cases the patches need to be manually installed by a service technician. That was a bit tough in the midst of the Covid shutdowns.
That’s all for me today. Remember to LIKE and SUBSCRIBE. And as always, until next time, be safe out there.
  continue reading

221集单集

Artwork
icon分享
 

已归档的系列专辑 ("不活跃的收取点" status)

When? This feed was archived on May 25, 2023 16:09 (10M ago). Last successful fetch was on July 29, 2022 18:35 (1+ y ago)

Why? 不活跃的收取点 status. 我们的伺服器已尝试了一段时间,但仍然无法截取有效的播客收取点

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 328278259 series 2478053
内容由Paul Torgersen提供。所有播客内容(包括剧集、图形和播客描述)均由 Paul Torgersen 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
A daily look at the relevant information security news from overnight.
Episode 237 - 12 May 2022
HP broken BIOS - https://www.bleepingcomputer.com/news/security/hp-fixes-bug-letting-attackers-overwrite-firmware-in-over-200-models/
New Nerbian -
https://threatpost.com/nerbian-rat-advanced-trick/179600/
Bitter at Bangladesh - https://www.bleepingcomputer.com/news/security/bitter-cyberspies-target-south-asian-govts-with-new-malware/
Fake Vanity - https://portswigger.net/daily-swig/box-zoom-google-docs-offer-phishing-boost-with-vanity-url-flaws
Konica cure- https://www.securityweek.com/konica-minolta-printers-vulnerable-hacking-physical-access
Hi, I’m Paul Torgersen. It’s Thursday May 12th, 2022, and this is a look at the information security news from overnight.
From BleepingComputer.com:
HP has released BIOS updates to fix two 8.8 severity vulnerabilities that would allow code to run with Kernel privileges, and affects over 200 PC and notebook products. The problem appears to be that an SMI handler can be triggered from the OS environment. You can see the details and a couple important links in the article.
From ThreatPost.com:
A newly discovered and complex remote access trojan dubbed Nerbian RAT, is spreading via malicious email campaigns using COVID-19 as a lure. This multi-feature baddie, including the ability to evade analysis or detection by researchers. The majority of the attacks have been centered in Spain and the United Kingdom.
From BleepingComputer.com:
APT cyberespionage group Bitter has been found targeting the government of Bangladesh with a new malware with remote file execution capabilities. These messages are sent via spoofed email addresses that appear to come from Pakistani government organizations. This was likely possible by exploiting a flaw in the Zimbra mail server that allows attackers to send messages from a non-existent mail domain. Full details from the Talos research in the article.
From PortSwigger.net:
Threat actors are enhancing their phishing campaigns by exploiting a failure to validate subdomains within so-called ‘vanity URLs’ used in SaaS applications. Apps such as Box, Zoom, and Google Docs validate vanity URLs’ URI (the unique sequence of characters at the end of the link), but not its descriptive subdomain, which is the portion preceding the URI.
And last today, from SecurityWeek.com:
Hundreds of thousands of Konica printers are vulnerable to hacking via ​​physical access. The vendor produced firmware and operating system patches in early 2020, but details are only being disclosed now because in many cases the patches need to be manually installed by a service technician. That was a bit tough in the midst of the Covid shutdowns.
That’s all for me today. Remember to LIKE and SUBSCRIBE. And as always, until next time, be safe out there.
  continue reading

221集单集

Semua episode

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南