6 links
tagged with all of: security + attack
Click any tag below to further narrow down your results
Links
The article discusses a recent supply chain attack targeting the npm ecosystem, which compromised the Shai Hulud package. It highlights the implications of such attacks on software security, emphasizing the need for vigilance in managing dependencies and securing the software supply chain.
Automating the WSUS attack involves exploiting the Windows Server Update Service by spoofing its IP address to serve malicious updates, allowing attackers to gain local administrative access on targeted Windows machines. The tool, wsuks, facilitates this attack by using ARP spoofing and serving a predefined PowerShell script alongside PsExec64.exe, enabling the creation of a new user with admin privileges or adding an existing domain user to the local admin group. Users must run the tool with root privileges on a local network with an HTTP-configured WSUS server.
PyPI users are being targeted by a phishing attack that attempts to trick them into logging into a fake PyPI site via a fraudulent email. The email, which appears to be from PyPI but uses a similar but incorrect domain, prompts users to verify their email, potentially compromising their credentials. Users are advised to delete the email if received and change their passwords if they have already clicked on the link.
A massive DDoS attack with a bandwidth of 73 Tbps has been reported, significantly impacting various online services. The attack utilized advanced techniques to overwhelm targeted systems, highlighting the ongoing vulnerabilities in cybersecurity defenses. Experts are urging organizations to enhance their protective measures against such large-scale threats.
Researchers have discovered a vulnerability in computer mice that allows attackers to eavesdrop on conversations by exploiting the way these devices communicate with computers. The technique, dubbed the "mic-e-mouse attack," highlights potential security risks associated with everyday peripherals, raising concerns about privacy and data protection.
Researchers from ETH Zurich and Google have developed a new Rowhammer attack variant named Phoenix, which successfully bypasses DDR5 memory chip protections, allowing attackers to flip bits and escalate privileges. Despite defenses like Target Row Refresh (TRR), the attack exploits specific refresh intervals, demonstrating vulnerabilities across all tested DDR5 memory modules. The findings highlight a critical security risk affecting DIMM RAM produced from 2021 to 2024, with practical implications for data integrity and system security.