Security News
![16 New CODESYS SDK Flaws Expose OT Environments to Remote Attacks](/static/build/img/news/16-new-codesys-sdk-flaws-expose-ot-environments-to-remote-attacks-small.jpg)
A set of 15 high-severity security flaws have been disclosed in the CODESYS V3 software development kit that could result in remote code execution and denial-of-service under specific conditions, posing risks to operational technology environments. "Exploitation of the discovered vulnerabilities, which affect all versions of CODESYS V3 prior to version 3.5.19.0, could put operational technology infrastructure at risk of attacks, such as remote code execution and denial-of-service," Vladimir Tokarev of the Microsoft Threat Intelligence Community said in a report.
![There's a good chance your VPN is vulnerable to privacy-menacing TunnelCrack attack](/static/build/img/news/there-s-a-good-chance-your-vpn-is-vulnerable-to-privacy-menacing-tunnelcrack-attack-small.jpg)
Especially on Apple gear, uni team says A couple of techniques collectively known as TunnelCrack can, in the right circumstances, be used by snoops to force victims' network traffic to go outside...
![MoustachedBouncer hackers use AiTM attacks to spy on diplomats](/static/build/img/news/moustachedbouncer-hackers-use-aitm-attacks-to-spy-on-diplomats-small.jpg)
A cyberespionage group named 'MoustachedBouncer' has been observed using adversary-in-the-middle (AitM) attacks at ISPs to hack foreign embassies in Belarus. [...]
![New Attack Alert: Freeze[.]rs Injector Weaponized for XWorm Malware Attacks](/static/build/img/news/new-attack-alert-freeze-rs-injector-weaponized-for-xworm-malware-attacks-small.jpg)
Malicious actors are using a legitimate Rust-based injector called Freeze[.]rs to deploy a commodity malware called XWorm in victim environments. The novel attack chain, detected by Fortinet...
![Nearly every AMD CPU since 2017 vulnerable to Inception data-leak attacks](/static/build/img/news/nearly-every-amd-cpu-since-2017-vulnerable-to-inception-data-leak-attacks-small.jpg)
AMD processor users, you have another data-leaking vulnerability to deal with: like Zenbleed, this latest hole can be to steal sensitive data from a running vulnerable machine. Inception utilizes a previously disclosed vulnerability alongside a novel kind of transient execution attack, which the researchers refer to as training in transient execution, to leak information from an operating system kernel at a rate of 39 bytes per second on vulnerable hardware.
![Hackers use open source Merlin post-exploitation toolkit in attacks](/static/build/img/news/hackers-use-open-source-merlin-post-exploitation-toolkit-in-attacks-small.jpg)
Ukraine is warning of a wave of attacks targeting state organizations using 'Merlin,' an open-source post-exploitation and command and control framework. Merlin is a Go-based cross-platform post-exploitation toolkit available for free via GitHub, offering extensive documentation for security professionals to use in red team exercises.
![Rhysida ransomware behind recent attacks on healthcare](/static/build/img/news/rhysida-ransomware-behind-recent-attacks-on-healthcare-small.jpg)
The Rhysida ransomware operation is making a name for itself after a wave of attacks on healthcare organizations has forced government agencies and cybersecurity companies to pay closer attention to its operations. While some ransomware operations claim not to intentionally target healthcare organizations and even provide free decryption keys if done by mistake, Rhysida does not appear to follow the same policy.
![Collide+Power, Downfall, and Inception: New Side-Channel Attacks Affecting Modern CPUs](/static/build/img/news/collide-power-downfall-and-inception-new-side-channel-attacks-affecting-modern-cpus-small.jpg)
Cybersecurity researchers have disclosed details of a trio of side-channel attacks that could be exploited to leak sensitive data from modern CPUs. "Downfall attacks target a critical weakness found in billions of modern processors used in personal and cloud computers," Daniel Moghimi, senior research scientist at Google, said.
![Downfall attacks can gather passwords, encryption keys from Intel processors](/static/build/img/news/downfall-attacks-can-gather-passwords-encryption-keys-from-intel-processors-small.jpg)
A variety of Intel Core processors and the devices using them are vulnerable to "Downfall", a new class of attacks made possible by CVE-2022-40982, which enables attackers to access and steal sensitive data such as passwords, encryption keys, and private data from other users on the same personal or cloud computer. " is caused by memory optimization features in Intel processors that unintentionally reveal internal hardware registers to software.
![Microsoft Office update breaks actively exploited RCE attack chain](/static/build/img/news/microsoft-office-update-breaks-actively-exploited-rce-attack-chain-small.jpg)
Microsoft today released a defense-in-depth update for Microsoft Office that prevents exploitation of a remote code execution vulnerability tracked as CVE-2023-36884 that threat actors have already leveraged in attacks. In today's Microsoft August Patch Tuesday, the update helps fix CVE-2023-36884, a security issue disclosed in July, which Microsoft did not patch at the time but provided mitigation advice.