Google: Big Sleep AI Agent Puts SQLite Software Bug to Bed

A research tool by the company found a vulnerability in the SQLite open source database, demonstrating the “defensive potential” for using LLMs to find vulnerabilities in applications before they’re publicly released.

darkreading – ​Read More

Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning

Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be exploited by a malicious actor to perform various actions, including denial-of-service, model poisoning, and model theft.
“Collectively, the vulnerabilities could allow an attacker to carry out a wide-range of malicious actions with a single HTTP request, including

The Hacker News – ​Read More

Cyberattack disrupts classes at Irish technology university

Students were advised that classes at SETU’s Waterford campuses would be postponed so academics could plan around the disruption.

The Record from Recorded Future News – ​Read More

Columbus says ransomware gang stole personal data of 500,000 Ohio residents

Columbus says hackers accessed resident’s Social Security numbers and bank account details

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Scammers Use DocuSign API to Evade Spam Filters with Phishing Invoices

Scammers are exploiting DocuSign’s APIs to send realistic fake invoices, primarily targeting security software like Norton. This phishing…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

210,000 Impacted by Saint Xavier University Data Breach

Saint Xavier University is notifying over 210,000 individuals of personal information compromise in a July 2023 data breach.

The post 210,000 Impacted by Saint Xavier University Data Breach appeared first on SecurityWeek.

SecurityWeek – ​Read More

ICS Vulnerability Intelligence Report: Key Insights and Recommendations

ICS Vulnerability

Overview

Cyble Research & Intelligence Labs (CRIL) has investigated key ICS vulnerabilities this week, providing critical insights issued by the Cybersecurity and Infrastructure Security Agency (CISA), focusing on multiple flaws in several ICS products.

During this reporting period, CISA issued four security advisories targeting vulnerabilities across various Industrial Control Systems, including those from ICONICS, Mitsubishi Electric, VIMESA, iniNet Solutions, and Deep Sea Electronics. These advisories pinpoint ICS vulnerabilities that security teams should prioritize for immediate patching to mitigate potential risks.

The recent vulnerability assessment has revealed a high-severity path traversal vulnerability in SpiderControl SCADA. The Deep Sea Electronics DSE855 has also been identified as susceptible to a configuration disclosure vulnerability. This issue enables unauthorized access to stored credentials via an HTTP GET request directed at the Backup.bin file.

ICS Vulnerabilities Overview

The Cyble Research & Intelligence Labs (CRIL) analysis details several critical vulnerabilities, providing essential information to help organizations prioritize their mitigation efforts. The following vulnerabilities were identified as the most vulnerable ones to look out for and patch immediately, if susceptible:

  • CVE-2024-7587: This vulnerability affects the ICONICS Suite, including products like GENESIS64 and Hyper Historian. This vulnerability is categorized as an issue of incorrect default permissions, which poses a high-severity risk to control systems such as DCS, SCADA, and BMS. A patch is available for this vulnerability.
  • CVE-2024-9692: This vulnerability relates to the Blue Plus Transmitter from VIMESA. It involves improper access control and is rated as medium severity, impacting communication units and transmitters. A link to the patch is provided for this issue as well. 
  • CVE-2024-10313: This vulnerability highlights a path traversal vulnerability in the SpiderControl HMI Editor from iniNet Solutions. This vulnerability is also classified as high severity and affects human-machine interface systems. A corresponding patch is accessible.
  • CVE-2024-5947: The last vulnerability, CVE-2024-5947, is related to DSE855 from Deep Sea Electronics. This medium-severity vulnerability is characterized by missing authentication, affecting communication units and transmitters. A patch link is available for users to address this vulnerability.

The severity overview reveals that all disclosed vulnerabilities fall into medium and high severity categories but need urgent attention.

Recommendations and Mitigations

To effectively address the identified vulnerabilities and upgrade defenses, organizations should consider the following best practices:

  1. Staying informed about security/patch advisories from vendors and regulatory bodies is crucial for timely updates.
  2. Organizations should implement a risk-based vulnerability management strategy to minimize the potential for exploitation.
  3. Threat intelligence analysts should actively monitor critical vulnerabilities published in CISA’s Known Exploited Vulnerabilities (KEV) catalog, especially those that are being actively exploited in the wild.
  4. Effective network segmentation can prevent attackers from conducting reconnaissance and lateral movements, thereby reducing the exposure of critical assets.
  5. Frequent vulnerability assessments and penetration testing are essential for identifying and rectifying security weaknesses.
  6. Implement physical barriers to prevent unauthorized access to devices and networks.
  7. An effective incident response plan outlines procedures for detecting, responding to, and recovering from security incidents. Regular testing and updates ensure its relevance to current threats.
  8. Ongoing cybersecurity training for all employees, particularly those with access to OT systems, is crucial. Training should cover recognizing phishing attempts, proper authentication practices, and adherence to security protocols.

Conclusion

The vulnerabilities identified in this ICS vulnerability intelligence report call for urgent prioritization from organizations to take apt cybersecurity measures. With threats continuously evolving and exploits discussed in underground forums, staying vigilant and proactive is essential.

Implementing the recommendations outlined above will help organizations protect their critical infrastructure and maintain system integrity, ultimately reducing the risk of potential exploitation of ICS vulnerabilities.

Sources: https://www.cisa.gov/news-events/alerts/2024/10/31/cisa-releases-four-industrial-control-systems-advisories

The post ICS Vulnerability Intelligence Report: Key Insights and Recommendations appeared first on Cyble.

Blog – Cyble – ​Read More

FBI Seeking Information on Chinese Hackers Targeting Sophos Firewalls

The FBI is asking for information on the Chinese threat actors targeting Sophos edge devices to compromise private and government entities.

The post FBI Seeking Information on Chinese Hackers Targeting Sophos Firewalls appeared first on SecurityWeek.

SecurityWeek – ​Read More

Monitoring Distributed Microservices

As data and usage grow, apps adopt distributed microservices with load balancers for scalability. Monitoring error rates, resource…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It)

As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit vulnerabilities for their gain. 
Imperva, a Thales company, recently published its annual holiday shopping cybersecurity guide. Data from the Imperva Threat Research team’s

The Hacker News – ​Read More