Security News > 2022 > August

Critical RCE Bug Could Let Hackers Remotely Take Over DrayTek Vigor Routers
2022-08-05 05:41

As many as 29 different router models from DrayTek have been identified as affected by a new critical, unauthenticated, remote code execution vulnerability that, if successfully exploited, could lead to full compromise of the device and unauthorized access to the broader network. Over 200,000 devices from the Taiwanese manufacturer are said to have the vulnerable service currently exposed on the internet and would require no user interaction to be exploited.

August 2022 Patch Tuesday forecast: Printers again?
2022-08-05 05:13

Looking ahead to next week, we have a server end-of-life and still more updates that can impact printers. There have been several updates to KB5005408 throughout the year to help administrators identify and manage these non-compliant printers.

Risk astute leadership: Converting intelligence into actionable controls
2022-08-05 04:00

In this Help Net Security video, John deCraen, Associate Managing Director at Kroll, talks about risk astute leadership and the leveraging of threat intelligence to inform actionable controls. The...

MI-X: Open source project helps you understand whether you are exploitable
2022-08-05 03:30

In this Help Net Security video, Ofri Ouzan, Security Researcher at Rezilion, talks about MI-X, an open source tool aimed at effectively determining whether a local host or a running container image is truly vulnerable to a specific vulnerability by accounting for all factors which affect actual exploitability. The tool prints the logical steps it takes in order to reach a decision and can generate a flow chart depicting the complete logical flow.

Organizations grew to love Kubernetes: Usage in production is high
2022-08-05 03:00

Kubernetes is delivering business value and is set to win an increasing share of production workloads, with almost all respondents to a Dimensional Research study saying they plan to scale and diversify their Kubernetes infrastructures in some way in the coming year. With growth comes increased complexity, and already those respondents that have the most extensive use of Kubernetes - with more clusters and more distributions, across more environments such as edge and with more software elements in their 'stack' such as monitoring, security, ingress or service mesh - are experiencing more significant challenges.

Bloke robbed of $800,000 in cryptocurrency by fake wallet app wants payback from Google
2022-08-04 23:45

Last October, California resident Jacob Pearlman downloaded an Android version of a cryptocurrency wallet app called Phantom from the Google Play app store. The free Phantom Wallet app that Pearlman downloaded early from Google Play was a fake.

Critical RCE vulnerability impacts 29 models of DrayTek routers
2022-08-04 23:18

Researchers at Trellix have discovered a critical unauthenticated remote code execution vulnerability impacting 29 models of the DrayTek Vigor series of business routers. The vulnerability is tracked as CVE-2022-32548 and carries a maximum CVSS v3 severity score of 10.0, categorizing it as critical.

New Traffic Light Protocol standard released after five years
2022-08-04 23:03

The Forum of Incident Response and Security Teams has published TLP 2.0, a new version of its Traffic Light Protocol standard, five years after the release of the initial version. The TLP standard is used in the computer security incident response team community to facilitate the greater sharing of sensitive information.

Hackers try to extort survey firm QuestionPro after alleged data theft
2022-08-04 21:29

Hackers attempted to extort the online survey platform QuestionPro after claiming to have stolen the company's database containing respondents' personal information. QuestionPro said that customers will be alerted of a data theft incident if it is determined that a data breach occurred.

DHS warns of critical flaws in Emergency Alert System devices
2022-08-04 19:41

The Department of Homeland Security warned that attackers could exploit critical security vulnerabilities in unpatched Emergency Alert System encoder/decoder devices to send fake emergency alerts via TV and radio networks. The warning was issued by DHS' Federal Emergency Management Agency as an advisory delivered through the Integrated Public Alert and Warning System.