28
submitted 16 hours ago by kid to c/cybersecurity
46
submitted 4 days ago by kid to c/cybersecurity

Morphisec, who discovered the flaw and published an advisory about it on July 9, has urged Microsoft to reclassify the vulnerability as "Critical" to reflect the higher estimated risk and ensure adequate mitigation efforts.

The security firm agreed with Microsoft that this RCE is more complex than CVE-2024-30103, making immediate exploitation less likely. However, combining it with another vulnerability could simplify attacks.

27
submitted 4 days ago by kid to c/cybersecurity
29
submitted 4 days ago by kid to c/cybersecurity
17
submitted 4 days ago by kid to c/cybersecurity
12
submitted 4 days ago by kid to c/cybersecurity
23
submitted 4 days ago by kid to c/cybersecurity
9
submitted 4 days ago by kid to c/cybersecurity
16
submitted 4 days ago by kid to c/cybersecurity
23
submitted 5 days ago by kid to c/cybersecurity
13
submitted 5 days ago by kid to c/cybersecurity
27
submitted 5 days ago by kid to c/cybersecurity
[-] kid 11 points 1 month ago

Instance Rules

Be respectful. Everyone should feel welcome here.

[-] kid 6 points 1 month ago

Not necessarily. Torrent is a way to find a peer for direct connection or via a relay (of course that is more than that). Syncthing, even using a relay server, requires some ports available for at least outbound connection (22000 TCP/UDP or whatever port the relay is using). This should not be possible in a medium security network, let alone a defense network. I don't know if syncthing works without a direct connection (to the peer or relay, something like transport via http proxy).

[-] kid 6 points 1 month ago

Honestly, I didn't think about vulnerability in SyncThing when I read the article. But I wondered why defense forces would have p2p open on their networks.

[-] kid 17 points 2 months ago

Please note that the attack can only be carried out if the local network itself is compromised.

[-] kid 13 points 3 months ago

Hackers 10 - 1 LastPass

[-] kid 13 points 3 months ago

From the article:

Microsoft locked down a server last month that exposed Microsoft employee passwords, keys and credentials to the open Internet, as the company faces growing pressure to strengthen the security of its software. Microsoft was notified of the vulnerability on February 6th and the block on March 5th. It is unclear whether anyone accessed the exposed server during this period.

[-] kid 10 points 3 months ago

In this particular case, the method of infection of the router was not disclosed. However, typically, the most common methods involve an open administration port to the internet (user interface or TR-069) or through the internal interface, in case a network host has been compromised.

They often perform brute-force password attacks, and once access is obtained, they look for typical Linux administrative tools (such as bash, etc.) and proceed to compromise the router.

So I understand that a router with custom firmware can be compromised if it has a weak password and resources to maintain the infection, or of course, a vulnerability that is exploitable.

[-] kid 8 points 3 months ago

Stop giving me your toughest battles

[-] kid 4 points 4 months ago

From the text:

Now, attackers breach a user's mobile account with stolen, brute-forced, or leaked credentials and initiate porting the victim's number to another device on their own. They can do this by generating a QR code through the hijacked mobile account that can be used to activate a new eSIM. They then scan it with their device, essentially hijacking the number.

No need for social engineering.

[-] kid 4 points 4 months ago
[-] kid 4 points 4 months ago

The shoemaker's son always goes barefoot.

[-] kid 34 points 4 months ago

A better summary:

The text discusses a series of cybersecurity breaches affecting Microsoft, involving sensitive data theft from US government officials and organizations, attributed to Chinese hackers. Microsoft's delayed response to discovered security flaws, including a 90-day wait for a partial fix, is criticized. Senator Ron Wyden has called for Microsoft's accountability. The breaches underscore the growing issue of security vulnerabilities in tech companies, leading to expectations that the US government will require companies to promptly disclose security incidents within a strict timeframe.

view more: next ›

kid

joined 5 months ago
MODERATOR OF