News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Microsoft Defender can be tricked
B2B Cyber ​​Security ShortNews

Microsoft's antivirus program Defender contains a component that is intended to detect and prevent the execution of malicious code using Rundll32.exe. However, this mechanism can be easily tricked, as a security researcher has discovered. All that is needed for the cyber attack is a simple comma to get past Microsoft Defender. All you have to do is insert an additional comma in the correct place in the code below and Microsoft Defender will see a harmless file instead of the threat. Security researcher John Page discovered the critical vulnerability. The vulnerability was discovered by Computer Emergency Response…

Read more

VMware: Critical 9.9 vulnerability in Aria Automation
B2B Cyber ​​Security ShortNews

VMware reports a critical vulnerability in Aria Automation with a CVSS score of 9.9 and strongly recommends an update. Otherwise, attackers could gain unauthorized access to remote organizations and workflows. The update is ready Aria Automation contains a security vulnerability regarding lack of access control. VMware has assessed the severity of this issue in the Critical Severity range with a maximum CVSSv3 base value of 9.9. The Aria Automation lack of access control vulnerability was defined in CVE-2023-34063. According to VMware, “An authenticated malicious actor could exploit this vulnerability and result in unauthorized access to remote organizations and workflows.” Updates are available…

Read more

Vulnerability in KYBER endangers post-quantum cryptography
B2B Cyber ​​Security ShortNews

KYBER, which is supposed to serve as the basis for post-quantum cryptography, probably still has vulnerabilities. Researchers have found a vulnerability in software libraries that can be circumvented using a timing-based attack. The National Security Agency (NSA), Facebook and Google are already relying on this. The KYBER key encapsulation method (KEM) was developed to replace classical encryption against cryptanalytic attacks using powerful quantum computers. It was developed by a team of developers from Europe and North America and is licensed under the Apache License 2.0. Vulnerability discovered in KYBER Researchers have discovered a vulnerability and are working on developing an attack...

Read more

Vulnerabilities: BSI recommends Chrome and Microsoft Edge Update
B2B Cyber ​​Security ShortNews

New vulnerabilities could allow attackers to execute code and control browsers remotely. The BSI therefore urgently recommends updating the browser, which is also very easy to do. The CVSS value of 8.8 is considered highly dangerous. The Federal Office for Information Security (BSI) warns users and companies of highly dangerous vulnerabilities with the CVSS value 8.8 in the Google Chrome and Microsoft Edge browsers under the Windows, MacOS and Linux operating systems. A remote, anonymous attacker could exploit multiple vulnerabilities in Google Chrome and Microsoft Edge to...

Read more

SSH vulnerable: Millions of servers are no longer secure
B2B Cyber ​​Security ShortNews

The SSH protocol has been in use for almost 30 years. Now Bochum researchers have developed an attack that has the potential to undermine, if not even disable, cryptographic SSH protection measures. According to ShadowServer, there are over 1 million SSH servers active in Germany - several million worldwide. The Terrapin attack is a new attack technique on the SSH protocol discovered by researchers at Ruhr University Bochum. The attack can compromise the integrity of secure SSH connections by making targeted adjustments to sequence numbers during the handshake as part of the connection setup. This allows the attacker to remove some messages sent by the client or…

Read more

Hackers find ways into Google accounts
B2B Cyber ​​Security ShortNews

According to researchers at Cloudsek.com, hackers are abusing an undocumented Google OAuth endpoint called “MultiLogin.” The experts are currently observing that other groups of cyber attackers are copying the technology and using it in their infostealers. Is a bigger wave coming now? Several information-stealing malware families exploit an undocumented Google OAuth endpoint called “MultiLogin” to recover expired authentication cookies and log in to user accounts. Even for accounts where the account password has been reset. Infostealer groups want to exploit the vulnerability The experts at Cloudsek.com report: The Lumma Infostealer, which contains the discovered exploit, was implemented on November 14th...

Read more

BSI warns: Microsoft Edge Browser requires security update  
B2B Cyber ​​Security ShortNews

The BSI has issued a warning for the Microsoft Edge browser because two highly dangerous security holes can be exploited by attackers. The problem can be solved with a quick update. The vulnerabilities CVE-2023-36026 and CVE-2023-36008 reported by the BSI have a CVSS base score of 7.8 and are therefore considered highly dangerous. The BSI describes the vulnerabilities as “A remote, anonymous attacker can exploit several vulnerabilities in Microsoft Edge to execute arbitrary program code or misrepresent information.” All versions below version number 119.0.2151.72 (Stable Channel) or below version 118.0.2088.109 are affected…

Read more

BSI: Vulnerability with 9.4 in Citrix NetScaler ADC and Gateway 
B2B Cyber ​​Security ShortNews

The BSI has issued a critical warning about a CVSS 9.4 vulnerability for the products Citrix NetScaler Application Delivery Controller and NetScaler Gateway. The vulnerability gives attackers access to sensitive information without authentication. According to specialist Mandiant, the vulnerability has been exploited for a long time. According to the BSI, the manufacturer Citrix published an advisory on vulnerabilities in the products NetScaler Application Delivery Controller (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) on October 10, 2023. The one critical security vulnerability is identified according to Common Vulnerabilities and Exposures (CVE) under the...

Read more

Cisco: Web UI of IOS XE with 10.0 vulnerability
B2B Cyber ​​Security ShortNews

The BSI warns of an actively exploited vulnerability in the Cisco Web UI of IOS XE. The CVE-2023-20198 vulnerability has the highest CVSS score of 10.0 and is therefore critical. Many switches, routers and WLAN controllers are at risk. On October 16, Cisco released an advisory regarding an unpatched and actively exploited vulnerability in the Web UI of IOS XE. The vulnerability with the identifier CVE-2023-20198 allows remote, unauthenticated attackers to create new accounts (with level 15 access rights) on the affected system. Attackers are therefore able to take control of affected…

Read more

BSI: 10.0 Vulnerability in Atlassian Confluence Data Center
B2B Cyber ​​Security ShortNews

The BSI – Federal Office for Information Security – warns of a critical CVSS 10.0 vulnerability in Atlassian Confluence Data Center and servers. Companies should apply security patches immediately, otherwise attackers could create administrator accounts. Atlassian itself had issued an advisory about the critical vulnerability with CVSS value 10.0 (CVE-2023-22515), but the BSI has now also issued a warning about a 10.0 vulnerability. Companies should urgently patch Confluence Data Center and servers because the gap should make it possible to create admin accounts. Whether and how strong the…

Read more