Fresh KB (26 Oct) with fix printing problems
https://support.microsoft.com/en-us/topic/october-26-2021-kb5006738-os-builds-19041-1320-19042-1320-and-19043-1320-preview-ccbce6bf-ae00-4e66-9789-ce8e7ea35541
https://support.microsoft.com/en-us/topic/october-26-2021-kb5006738-os-builds-19041-1320-19042-1320-and-19043-1320-preview-ccbce6bf-ae00-4e66-9789-ce8e7ea35541
Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign
https://blog.lookout.com/lookout-discovers-global-rooting-malware-campaign
https://blog.lookout.com/lookout-discovers-global-rooting-malware-campaign
Lookout
Rooting Malware Makes Comeback: Lookout Discovers Global Campaign | Threat Intel
Security researchers at Lookout have identified a new rooting malware distributed on Google Play, the Amazon Appstore and the Samsung Galaxy Store.
Agent 007: Pre-Auth Takeover of Build Pipelines in GoCD
In this blog post, we detail a vulnerability that lets unauthenticated attackers leak highly sensitive information from a vulnerable GoCD Server instance, including all encrypted secrets stored on the server
https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover
In this blog post, we detail a vulnerability that lets unauthenticated attackers leak highly sensitive information from a vulnerable GoCD Server instance, including all encrypted secrets stored on the server
https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover
Sonarsource
Agent 007: Pre-Auth Takeover of Build Pipelines in GoCD
We recently discovered critical security issues in the popular CI/CD solution GoCD that can be exploited by unauthenticated attackers
Avast releases decryptor for AtomSilo and LockFile ransomware
https://decoded.avast.io/threatintel/decryptor-for-atomsilo-and-lockfile-ransomware/
https://decoded.avast.io/threatintel/decryptor-for-atomsilo-and-lockfile-ransomware/
Gendigital
Raspberry Robin’s Roshtyak: A Little Lesson in Trickery
Innovative Evasion Techniques in Roshtyak
New Quishing Campaign Shows How Threat Actors Innovate to Bypass Security
https://abnormalsecurity.com/blog/qr-code-campaign-bypass-security
https://abnormalsecurity.com/blog/qr-code-campaign-bypass-security
Abnormal AI
New Quishing Campaign Shows How Security Can Be Bypassed
A new phishing campaign using QR codes exploits compromised hosts to send emails, and major services to maintain and host their phishing pages.
Microsoft finds new macOS vulnerability, Shrootless, that could bypass System Integrity Protection
https://www.microsoft.com/security/blog/2021/10/28/microsoft-finds-new-macos-vulnerability-shrootless-that-could-bypass-system-integrity-protection/
https://www.microsoft.com/security/blog/2021/10/28/microsoft-finds-new-macos-vulnerability-shrootless-that-could-bypass-system-integrity-protection/
Microsoft News
Microsoft finds new macOS vulnerability, Shrootless, that could bypass System Integrity Protection
Microsoft found a vulnerability (CVE-2021-30892) that could allow an attacker to bypass System Integrity Protection (SIP) in macOS. We shared our findings with Apple via coordinated vulnerability disclosure, and a fix was released October 26.
SECURITY_GUIDANCE_FOR_5G_CLOUD_INFRASTRUCTURES_PART_I_20211028.PDF
420.9 KB
SECURITY GUIDANCE FOR 5G
CLOUD INFRASTRUCTURES
CLOUD INFRASTRUCTURES
Windows User Profile Service 0day LPE
https://halove23.blogspot.com/2021/10/windows-user-profile-service-0day.html?m=1
https://halove23.blogspot.com/2021/10/windows-user-profile-service-0day.html?m=1
Documents reveal Facebook targeted children as young as 6 for consumer base
https://www.nbcnews.com/tech/social-media/facebook-documents-reveal-company-targeted-children-young-6-rcna4021
https://www.nbcnews.com/tech/social-media/facebook-documents-reveal-company-targeted-children-young-6-rcna4021
NBC News
Facebook documents reveal company targeted children as young as 6
Facebook was hiring employees to build out programs for children and young adults from ages 6 to 17, according to a company blog post.
Trojan Source: Invisible Vulnerabilities
paper describing cool new tricks for crafting targeted vulnerabilities that are invisible to human code reviewers
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
up
https://trojansource.codes
https://github.com/nickboucher/trojan-source#trojan-source
paper describing cool new tricks for crafting targeted vulnerabilities that are invisible to human code reviewers
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
up
https://trojansource.codes
https://github.com/nickboucher/trojan-source#trojan-source
GitLab Unauthenticated Remote Code Execution CVE-2021-22205 Exploited in the Wild
https://www.rapid7.com/blog/post/2021/11/01/gitlab-unauthenticated-remote-code-execution-cve-2021-22205-exploited-in-the-wild/
https://www.rapid7.com/blog/post/2021/11/01/gitlab-unauthenticated-remote-code-execution-cve-2021-22205-exploited-in-the-wild/
Rapid7
GitLab Unauthenticated RCE CVE-2021-22205 Exploited in the Wild | Rapid7 Blog
Worth the wait: Fedora Linux 35 is here! - Fedora Magazine
https://fedoramagazine.org/announcing-fedora-35/
https://fedoramagazine.org/announcing-fedora-35/
Fedora Magazine
Worth the wait: Fedora Linux 35 is here! - Fedora Magazine
Today, I’m excited to share the results of the hard work of thousands of Fedora Project contributors: our latest release, Fedora Linux 35, is here! While we broke our six-release streak of on-schedule releases, we felt it was more important to resolve a few…
Phishing emails seemingly coming from a Kaspersky email address
https://support.kaspersky.com/general/vulnerability.aspx?el=12430#01112021_phishing
https://support.kaspersky.com/general/vulnerability.aspx?el=12430#01112021_phishing
Kaspersky
List of Advisories
List of disclosed vulnerabilities in Kaspersky products and researchers that reported them to us.
Pink, a botnet that competed with the vendor to control the massive infected devices
https://blog.netlab.360.com/pink-en/
https://blog.netlab.360.com/pink-en/
360 Netlab Blog - Network Security Research Lab at 360
Pink, a botnet that competed with the vendor to control the massive infected devices
Most of the following article was completed around early 2020, at that time the vendor was trying different ways to recover the massive amount of infected devices, we shared our findings with the vendor, as well as to CNCERT, and decided to not publish the…
warn_about_of_ramsomaware_from_fbi.pdf
1.4 MB
Tactics, Techniques, and Indicators of Compromise Associated
with Hello Kitty/FiveHands Ransomware
with Hello Kitty/FiveHands Ransomware
Ransomware attack to Toronto transport infrastructure
Attack to city infrastructure it is a good signal about of severity thread and defense levels...
https://therecord.media/ransomware-attack-disrupts-torontos-public-transportation-system/
Attack to city infrastructure it is a good signal about of severity thread and defense levels...
https://therecord.media/ransomware-attack-disrupts-torontos-public-transportation-system/
The Record
Ransomware attack disrupts Toronto’s public transportation system
A ransomware attack has disrupted the activities of the Toronto public transportation agency and has taken down several systems used by drivers and commuters alike.
What’s new in RHEL 9
Beta release is now-available
https://developers.redhat.com/articles/2021/11/03/red-hat-enterprise-linux-9-beta-here
Beta release is now-available
https://developers.redhat.com/articles/2021/11/03/red-hat-enterprise-linux-9-beta-here
Red Hat Developer
Red Hat Enterprise Linux 9 Beta is here | Red Hat Developer
We’ve been working hard on Red Hat Enterprise Linux 9. Red Hat Enterprise Linux 9 Beta is now available—and it’s been built with production stability and development agility in mind. Built from CentOS
Credit card skimmer evades Virtual Machines - Malwarebytes Labs | Malwarebytes Labs
https://blog.malwarebytes.com/threat-intelligence/2021/11/credit-card-skimmer-evades-virtual-machines/
https://blog.malwarebytes.com/threat-intelligence/2021/11/credit-card-skimmer-evades-virtual-machines/
Malwarebytes
Credit card skimmer evades Virtual Machines
This blog post was authored by Jérôme Segura There are many techniques threat actors use to slow down analysis or, even...