### #PromptInjection #AIExploitation #SessionHijacking

Summary: A recently patched vulnerability in the DeepSeek AI chatbot allowed for prompt injection attacks, enabling attackers to hijack user sessions and access sensitive data. This flaw highlights the risks associated with cross-site scripting (XSS) in AI applications and the potential for broader exploitation across various platforms.…

Read More

### #MachineLearningSecurity #ModelExploitation #SupplyChainRisks

Summary: Recent research has unveiled multiple security vulnerabilities in open-source machine learning tools that could enable code execution and compromise sensitive data. These flaws, affecting popular frameworks like MLflow, H2O, and PyTorch, highlight the risks associated with loading untrusted ML models.

Threat Actor: Unknown | unknown Victim: Organizations using ML tools | organizations using ML tools

Key Point :

Multiple vulnerabilities discovered in ML frameworks could lead to remote code execution (RCE).…
Read More

### #RomanianElections #InfluenceCampaign #CyberEspionage

Summary: The Romanian constitutional court annulled the presidential elections due to a TikTok influence campaign linked to Russia, alongside over 85,000 cyberattacks targeting the country’s election infrastructure. Declassified intelligence reports reveal significant vulnerabilities exploited by threat actors, suggesting state-sponsored interference.

Threat Actor: Unknown State Actor | Russia Victim: Romanian Electoral Authority | Romanian Electoral Authority

Key Point :

Romania’s election infrastructure faced over 85,000 cyberattacks, with compromised credentials leaked on Russian forums.…
Read More
Summary: Incorporating application security (AppSec) expertise into Red Team assessments enhances organizations’ ability to simulate modern attack tactics effectively. This approach emphasizes securing internet-facing assets, recognizing low-impact vulnerabilities, and fostering collaboration among diverse skill sets. By integrating AppSec throughout the engagement, organizations can proactively defend against evolving threats, ensuring a robust security posture.…
Read More

### #MobSFExploits #XSSFlaw #ScriptInjection

Summary: A critical Stored Cross-Site Scripting (XSS) vulnerability, CVE-2024-53999, has been discovered in the Mobile Security Framework (MobSF), allowing attackers to inject malicious scripts through improperly handled file uploads. This flaw poses significant risks to user data confidentiality and system integrity.

Threat Actor: Unknown | unknown Victim: Mobile Security Framework (MobSF) | Mobile Security Framework

Key Point :

A vulnerability in MobSF version 4.2.8 allows file uploads with script-laden filenames, leading to potential XSS attacks.…
Read More

### #WebVPNExploitation #XSSVulnerability #CiscoAdvisory

Summary: Cisco Systems has issued an urgent advisory regarding the exploitation of CVE-2014-2120, a cross-site scripting vulnerability affecting the WebVPN login page of Cisco ASA Software. Organizations are urged to take immediate action to mitigate this risk due to confirmed active exploitation.…

Read More

### #IndustrialIoT #AccessPointExploits #RemoteCodeExecution

Summary: A series of critical vulnerabilities in Advantech EKI industrial-grade wireless access points could allow attackers to execute remote code with elevated privileges, posing severe risks to device security. These flaws could enable unauthorized access and control over affected devices, leading to potential network infiltration.…

Read More

### #AIThreats #CloudSecurity #PrivilegeEscalation

Summary: Microsoft has patched four significant security vulnerabilities affecting its AI and cloud services, including one actively exploited in the wild. The most critical flaw, CVE-2024-49035, allows unauthorized privilege escalation on partner.microsoft.com.

Threat Actor: Unknown | unknown Victim: Microsoft | Microsoft

Key Point :

Microsoft identified CVE-2024-49035 as a privilege escalation vulnerability with a CVSS score of 8.7, marked as “Exploitation Detected.”…
Read More

### #VMwareSecurity #AriaOperations #PrivilegeEscalation

Summary: VMware has released patches to fix multiple vulnerabilities in its Aria Operations product, with the most critical allowing local privilege escalation. The vulnerabilities range from Important to Moderate severity, affecting various versions of the software.

Threat Actor: Unknown | malicious actor Victim: VMware | VMware

Key Point :

Vulnerabilities include CVE-2024-38830 and CVE-2024-38831, both allowing privilege escalation to root user.…
Read More

This report highlights the significant rise in phishing incidents and malware activity, particularly targeting U.S. organizations. Key threats include “SocGholish” and “LummaC2” malware, alongside increasing ransomware attacks, especially from “RansomHub.” Organizations are urged to enhance their cybersecurity measures and training to combat these evolving threats. #Cybersecurity #Phishing #Ransomware

Keypoints :

Phishing incidents accounted for 46% of all customer incidents from August 1 to October 31, 2024.…
Read More

### #ZeroDayExploits #AppleSecurity #OracleVulnerabilities

Summary: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added new vulnerabilities to its Known Exploited Vulnerabilities catalog, including critical flaws in Apple and Oracle products that are actively being exploited. Apple has released security updates addressing two zero-day vulnerabilities that could lead to severe security risks.…

Read More

### #WowzaStreamingEngine #RemoteCodeExecution #XSSVulnerabilities

Summary: Multiple vulnerabilities have been discovered in Wowza Streaming Engine, allowing remote attackers to gain complete control over affected systems. With approximately 18,500 servers exposed to the internet, organizations are urged to update to the latest version to mitigate risks.

Threat Actor: Unknown | unknown Victim: Wowza Media Systems | Wowza Media Systems

Key Point :

Severe vulnerabilities include unauthenticated stored XSS and authenticated remote code execution.…
Read More

Summary and Keypoints

Summary

The video discusses how to understand and execute Cross-Site Scripting (XSS) attacks in JavaScript, using various coding techniques and strategies to achieve it.

Key Points Introduction to the concept of XSS (Cross-Site Scripting). Basic PHP file setup for testing XSS. Importance of parameter manipulation in function calls.…
Read More

Summary: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple vulnerabilities in Palo Alto Networks Expedition to its Known Exploited Vulnerabilities (KEV) catalog, which could allow attackers to access sensitive data and potentially take over firewall administrator accounts. These vulnerabilities include command injection and SQL injection flaws that affect versions prior to 1.2.96 of the Expedition tool.…

Read More

Summary: SAP has released eight new security notes and two updates addressing critical vulnerabilities in various products, including XSS and missing authorization checks. Key vulnerabilities include CVE-2024-47590 and CVE-2024-39592, which pose significant risks to user data and system integrity.

Threat Actor: Unknown | unknown Victim: SAP Users | SAP Users

Key Point :

SAP has released eight new security notes addressing critical vulnerabilities across its products.…
Read More

Summary:

CloudSEK’s Threat Research team has identified significant threats posed by the Androxgh0st botnet, which has been exploiting multiple vulnerabilities since January 2024. This botnet targets various technologies, including web servers and IoT devices, and shows signs of operational integration with the Mozi botnet. Immediate patching of vulnerabilities is recommended to mitigate risks.…
Read More

Summary: A critical cross-site scripting (XSS) vulnerability in pfSense v2.5.2, tracked as CVE-2024-46538, allows attackers to execute arbitrary scripts on affected systems, potentially leading to remote code execution. Discovered by security researcher physicszq, the flaw poses significant risks for users of this popular open-source firewall and router software.…

Read More