FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack

By: Newsroom β€” May 24th 2024 at 16:30
The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by exploiting zero-day flaws in Ivanti Connect Secure (ICS) involved the threat actor creating rogue virtual machines (VMs) within its VMware environment. "The adversary created their own rogue VMs within the VMware environment, leveraging compromised vCenter Server access,"
☐ β˜† βœ‡ The Hacker News

Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern

By: Newsroom β€” May 23rd 2024 at 17:03
Ransomware attacks targeting VMware ESXi infrastructure follow an established pattern regardless of the file-encrypting malware deployed, new findings show. "Virtualization platforms are a core component of organizational IT infrastructure, yet they often suffer from inherent misconfigurations and vulnerabilities, making them a lucrative and highly effective target for threat actors to abuse,"
☐ β˜† βœ‡ The Hacker News

It's Time to Master the Lift & Shift: Migrating from VMware vSphere to Microsoft Azure

By: The Hacker News β€” May 15th 2024 at 10:55
While cloud adoption has been top of mind for many IT professionals for nearly a decade, it’s only in recent months, with industry changes and announcements from key players, that many recognize the time to make the move is now. It may feel like a daunting task, but tools exist to help you move your virtual machines (VMs) to a public cloud provider – like Microsoft Azure
☐ β˜† βœ‡ The Hacker News

VMware Patches Severe Security Flaws in Workstation and Fusion Products

By: Newsroom β€” May 14th 2024 at 15:49
Multiple security flaws have been disclosed in VMware Workstation and Fusion products that could be exploited by threat actors to access sensitive information, trigger a denial-of-service (DoS) condition, and execute code under certain circumstances. The four vulnerabilities impact Workstation versions 17.x and Fusion versions 13.x, with fixes available in version 17.5.2 and
☐ β˜† βœ‡ The Hacker News

China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion

By: Newsroom β€” May 7th 2024 at 12:55
The MITRE Corporation has offered more details into the recently disclosed cyber attack, stating that the first evidence of the intrusion now dates back to December 31, 2023. The attack, which came to light last month, singled out MITRE's Networked Experimentation, Research, and Virtualization Environment (NERVE) through the exploitation of two Ivanti Connect Secure zero-day
☐ β˜† βœ‡ The Hacker News

Severe Flaws Disclosed in Brocade SANnav SAN Management Software

By: Newsroom β€” April 26th 2024 at 14:03
Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management application could be exploited to compromise susceptible appliances. The 18 flaws impact all versions up to and including 2.3.0, according to independent security researcher Pierre Barre, who discovered and reported them. The issues range from incorrect firewall rules,
☐ β˜† βœ‡ The Hacker News

MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

By: The Hacker News β€” April 22nd 2024 at 11:05
The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in Ivanti Connect Secure appliances starting in January 2024. The intrusion led to the compromise of its Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified research and prototyping network. The unknown adversary "performed reconnaissance
☐ β˜† βœ‡ The Hacker News

VMware Issues Security Patches for ESXi, Workstation, and Fusion Flaws

By: Newsroom β€” March 6th 2024 at 07:20
VMware has released patches to address four security flaws impacting ESXi, Workstation, and Fusion, including two critical flaws that could lead to code execution. Tracked as CVE-2024-22252 and CVE-2024-22253, the vulnerabilities have been described as use-after-free bugs in the XHCI USB controller. They carry a CVSS score of 9.3 for Workstation and Fusion, and 8.4 for ESXi systems. "A
☐ β˜† βœ‡ The Hacker News

New BIFROSE Linux Malware Variant Using Deceptive VMware Domain for Evasion

By: Newsroom β€” March 1st 2024 at 10:56
Cybersecurity researchers have discovered a new Linux variant of a remote access trojan (RAT) called BIFROSE (aka Bifrost) that uses a deceptive domain mimicking VMware. "This latest version of Bifrost aims to bypass security measures and compromise targeted systems," Palo Alto Networks Unit 42 researchers Anmol Maurya and Siddharth Sharma said. BIFROSE is one of the long-standing
☐ β˜† βœ‡ The Hacker News

VMware Alert: Uninstall EAP Now - Critical Flaw Puts Active Directory at Risk

By: Newsroom β€” February 21st 2024 at 05:34
VMware is urging users to uninstall the deprecated Enhanced Authentication Plugin (EAP) following the discovery of a critical security flaw. Tracked as CVE-2024-22245 (CVSS score: 9.6), the vulnerability has been described as an arbitrary authentication relay bug. "A malicious actor could trick a target domain user with EAP installed in their web browser into requesting and relaying
☐ β˜† βœ‡ The Hacker News

Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years

By: Newsroom β€” January 20th 2024 at 10:23
An advanced China-nexus cyber espionage group previously linked to the exploitation of security flaws in VMware and Fortinet appliances has been attributed to the abuse of a critical vulnerability in VMware vCenter Server as a zero-day since late 2021. "UNC3886 has a track record of utilizing zero-day vulnerabilities to complete their mission without being detected, and this latest example
☐ β˜† βœ‡ The Hacker News

Citrix, VMware, and Atlassian Hit with Critical Flaws β€” Patch ASAP!

By: Newsroom β€” January 17th 2024 at 04:14
Citrix is warning of two zero-day security vulnerabilities in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) that are being actively exploited in the wild. The flaws are listed below - CVE-2023-6548 (CVSS score: 5.5) - Authenticated (low privileged) remote code execution on Management Interface (requires access to NSIP, CLIP, or SNIP with management
☐ β˜† βœ‡ The Hacker News

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

By: Newsroom β€” November 18th 2023 at 11:27
The threat actors behind theΒ 8Base ransomwareΒ are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come from Cisco Talos, which has recorded an increase in activity carried out by the cybercriminals. β€œMost of the group’s Phobos variants are distributed by SmokeLoader, a backdoor trojan," security researcher Guilherme Venere said in an
☐ β˜† βœ‡ The Hacker News

Urgent: VMware Warns of Unpatched Critical Cloud Director Vulnerability

By: Newsroom β€” November 15th 2023 at 04:18
VMware is warning of a critical and unpatched security flaw in Cloud Director that could be exploited by a malicious actor to get around authentication protections. Tracked asΒ CVE-2023-34060Β (CVSS score: 9.8), the vulnerability impacts instances that have been upgraded to version 10.5 from an older version. "On an upgraded version of VMware Cloud Director Appliance 10.5, a malicious actor with
☐ β˜† βœ‡ The Hacker News

Researchers Find 34 Windows Drivers Vulnerable to Full Device Takeover

By: Newsroom β€” November 2nd 2023 at 08:59
As many as 34 unique vulnerable Windows Driver Model (WDM) and Windows Driver Frameworks (WDF) drivers could be exploited by non-privileged threat actors to gain full control of the devices and execute arbitrary code on the underlying systems. "By exploiting the drivers, an attacker without privilege may erase/alter firmware, and/or elevate [operating system] privileges," Takahiro Haruyama, a
☐ β˜† βœ‡ The Hacker News

Act Now: VMware Releases Patch for Critical vCenter Server RCE Vulnerability

By: Newsroom β€” October 25th 2023 at 10:11
VMware has released security updates to address a critical flaw in the vCenter Server that could result in remote code execution on affected systems. The issue, tracked asΒ CVE-2023-34048Β (CVSS score: 9.8), has been described as an out-of-bounds write vulnerability in the implementation of theΒ DCE/RPC protocol. "A malicious actor with network access to vCenter Server may trigger an out-of-bounds
☐ β˜† βœ‡ The Hacker News

Alert: PoC Exploits Released for Citrix and VMware Vulnerabilities

By: Newsroom β€” October 25th 2023 at 04:47
Virtualization services provider VMware has alerted customers to the existence of a proof-of-concept (PoC) exploit for a recently patched security flaw in Aria Operations for Logs. Tracked as CVE-2023-34051 (CVSS score: 8.1), the high-severity vulnerability relates to a case of authentication bypass that could lead to remote code execution. "An unauthenticated, malicious actor can inject files
☐ β˜† βœ‡ The Hacker News

PoC Exploit Released for Critical VMware Aria's SSH Auth Bypass Vulnerability

By: THN β€” September 3rd 2023 at 04:42
Proof-of-concept (PoC) exploit code has been made available for a recently disclosed and patched critical flaw impacting VMware Aria Operations for Networks (formerly vRealize Network Insight). The flaw, tracked asΒ CVE-2023-34039, is rated 9.8 out of a maximum of 10 for severity and has been described as a case of authentication bypass due to a lack of unique cryptographic key generation. β€œA
☐ β˜† βœ‡ The Hacker News

Critical Vulnerability Alert: VMware Aria Operations Networks at Risk from Remote Attacks

By: THN β€” August 30th 2023 at 06:57
VMware has released software updates to correct two security vulnerabilities in Aria Operations for Networks that could be potentially exploited to bypass authentication and gain remote code execution. The most severe of the flaws is CVE-2023-34039 (CVSS score: 9.8), which relates to a case of authentication bypass arising as a result of a lack of unique cryptographic key generation. "A
☐ β˜† βœ‡ The Hacker News

8Base Ransomware Spikes in Activity, Threatens U.S. and Brazilian Businesses

By: Ravie Lakshmanan β€” June 28th 2023 at 10:15
A ransomware threat called 8Base that has been operating under the radar for over a year has been attributed to a "massive spike in activity" in May and June 2023. "The group utilizes encryption paired with 'name-and-shame' techniques to compel their victims to pay their ransoms," VMware Carbon Black researchers Deborah Snyder and Fae CarlisleΒ saidΒ in a report shared with The Hacker News. "8Base
☐ β˜† βœ‡ The Hacker News

Alert! Hackers Exploiting Critical Vulnerability in VMware's Aria Operations Networks

By: Ravie Lakshmanan β€” June 21st 2023 at 05:00
VMware has flagged that a recently patched critical command injection vulnerability in Aria Operations for Networks (formerly vRealize Network Insight) has come under active exploitation in the wild. The flaw, tracked asΒ CVE-2023-20887, couldΒ allowΒ a malicious actor with network access to the product to perform a command injection attack, resulting in remote code execution. It impacts VMware
☐ β˜† βœ‡ The Hacker News

Chinese Hackers Exploit VMware Zero-Day to Backdoor Windows and Linux Systems

By: Ravie Lakshmanan β€” June 14th 2023 at 16:46
The Chinese state-sponsored group known asΒ UNC3886Β has been found to exploit a zero-day flaw in VMware ESXi hosts to backdoor Windows and Linux systems. The VMware Tools authentication bypass vulnerability, tracked asΒ CVE-2023-20867Β (CVSS score: 3.9), "enabled the execution of privileged commands across Windows, Linux, and PhotonOS (vCenter) guest VMs without authentication of guest credentials
☐ β˜† βœ‡ The Hacker News

Urgent Security Updates: Cisco and VMware Address Critical Vulnerabilities

By: Ravie Lakshmanan β€” June 8th 2023 at 05:18
VMware hasΒ releasedΒ security updates to fix a trio of flaws in Aria Operations for Networks that could result in information disclosure and remote code execution. The most critical of the three vulnerabilities is a command injection vulnerability tracked asΒ CVE-2023-20887Β (CVSS score: 9.8) that could allow a malicious actor with network access to achieve remote code execution. Also patched by
☐ β˜† βœ‡ The Hacker News

Alarming Surge in TrueBot Activity Revealed with New Delivery Vectors

By: Ravie Lakshmanan β€” June 5th 2023 at 04:31
A surge in TrueBot activity was observed in May 2023, cybersecurity researchers disclosed. "TrueBot is a downloader trojan botnet that uses command and control servers to collect information on compromised systems and uses that compromised system as a launching point for further attacks," VMware's Fae CarlisleΒ said. Active since at least 2017, TrueBot is linked to a group known as Silence that's
☐ β˜† βœ‡ The Hacker News

New Linux Ransomware Strain BlackSuit Shows Striking Similarities to Royal

By: Ravie Lakshmanan β€” June 3rd 2023 at 08:20
An analysis of the Linux variant of a new ransomware strain called BlackSuit has covered significant similarities with another ransomware family calledΒ Royal. Trend Micro, which examined an x64 VMware ESXi version targeting Linux machines, said it identified an "extremely high degree of similarity" between Royal and BlackSuit. "In fact, they're nearly identical, with 98% similarities in
❌