Ultralytics AI Library with 60M Downloads Compromised for Cryptomining
Another day, another supply chain attack!
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Another day, another supply chain attack!
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
The Blue Yonder ransomware attack that caused disruptions to Starbucks and major grocery stores may have also involved information theft.
The post Blue Yonder Probing Data Theft Claims After Ransomware Gang Takes Credit for Attack appeared first on SecurityWeek.
SecurityWeek – Read More
Details have emerged about a now-patched security flaw in the DeepSeek artificial intelligence (AI) chatbot that, if successfully exploited, could permit a bad actor to take control of a victim’s account by means of a prompt injection attack.
Security researcher Johann Rehberger, who has chronicled many a prompt injection attack targeting various AI tools, found that providing the input “Print
The Hacker News – Read More
Deloitte has issued a response after the Brain Cipher ransomware group claimed to have stolen over 1 Tb of information belonging to the company.
The post Deloitte Responds After Ransomware Group Claims Data Theft appeared first on SecurityWeek.
SecurityWeek – Read More
EU sent TikTok an urgent request for more information about Romanian intelligence files suggesting that Russia coordinated influencers to promote a candidate who became the surprise front-runner in presidential election.
The post The EU Makes an Urgent TikTok Inquiry on Russia’s Role in Romanian Election Turmoil appeared first on SecurityWeek.
SecurityWeek – Read More
Anna Jaques Hospital says the personal information of over 316,000 individuals was compromised in a year-old data breach.
The post Anna Jaques Hospital Data Breach Impacts 316,000 People appeared first on SecurityWeek.
SecurityWeek – Read More

QNAP NAS systems, a trusted choice for personal and enterprise data storage, have recently been flagged for multiple critical vulnerabilities.
Multiple vulnerabilities have been identified in QNAP’s operating systems, leaving users exposed to a variety of potential threats, including remote code execution, denial of service (DoS), data manipulation, sensitive information disclosure, and security restriction bypass. If exploited, these vulnerabilities could compromise not just the integrity of the systems but also the valuable data they house.
With businesses and individuals relying heavily on QNAP NAS for secure storage, these vulnerabilities highlight the growing need for strong security measures and proactive updates. This blog dives deep into the technical aspects of the vulnerabilities, their impact, and how users can protect their systems.
The reported vulnerabilities pose significant threats to the security and stability of QNAP NAS systems. Here’s a breakdown of the potential impacts:
| Impact | Description |
| Remote Code Execution | Allows attackers to execute arbitrary code on the system remotely. |
| Denial of Service (DoS) | Overloads the system, making it inaccessible to legitimate users. |
| Information Disclosure | Exposes sensitive information stored in the NAS to unauthorized users. |
| Data Manipulation | Enables attackers to alter, delete, or corrupt critical data. |
| Security Restriction Bypass | Allows attackers to circumvent security controls, leading to unauthorized access. |
The vulnerabilities affect specific versions of QNAP’s operating systems, including QTS and QuTS hero. Below is the list of impacted systems:
| Operating System | Affected Versions |
| QTS | 5.1.x, 5.2.x |
| QuTS hero | h5.1.x, h5.2.x |
These vulnerabilities, identified by their Common Vulnerabilities and Exposures (CVE) identifiers, target various system components. A closer look at each vulnerability:
| CVE ID | Vulnerability Type | Description |
| CVE-2024-48859 | Improper Authentication | Could allow remote attackers to compromise the system’s security. |
| CVE-2024-48865 | Improper Certificate Validation | Enables attackers with local network access to compromise security. |
| CVE-2024-48866 | Improper URL Encoding Handling | Causes the system to enter an unexpected state. |
| CVE-2024-48867, 48868 | CRLF Injection | Permits attackers to modify application data. |
| CVE-2024-50393 | Command Injection | Allows remote attackers to execute arbitrary commands on the system. |
| CVE-2024-50402, 50403 | Externally-Controlled Format String | Enables attackers with administrator privileges to access secret data or modify system memory. |
These vulnerabilities highlight a range of attack vectors, from improper input validation to poorly managed authentication mechanisms.
QNAP has released patches addressing these vulnerabilities in updated versions of its operating systems. Users are strongly encouraged to update to the fixed versions as shown below:
| Affected Product | Fixed Version | Release Date |
| QTS 5.1.x | QTS 5.1.9.2954 build 20241120 and later | November 20, 2024 |
| QTS 5.2.x | QTS 5.2.2.2950 build 20241114 and later | November 14, 2024 |
| QuTS hero h5.1.x | QuTS hero h5.1.9.2954 build 20241120 and later | November 20, 2024 |
| QuTS hero h5.2.x | QuTS hero h5.2.2.2952 build 20241116 and later | November 16, 2024 |
How to Update
To ensure your QNAP NAS system is secure, follow these steps to update your firmware:
Why These Vulnerabilities Matter
QNAP NAS devices are widely used in personal and enterprise environments. Sensitive data such as backups, financial records, and confidential information are often stored on these systems, and a breach can lead to catastrophic consequences, including financial losses and reputational damage.
Key Lessons for Users
The discovery of these vulnerabilities points out the importance of maintaining strong cybersecurity practices for critical systems like QNAP NAS. With the provided fixes and recommendations, users can safeguard their systems against potential exploitation.
Stay vigilant, update promptly, and prioritize security to ensure the integrity of your data and systems.
Source:
https://www.hkcert.org/security-bulletin/qnap-nas-multiple-vulnerabilities_20241209
https://www.qnap.com/en/security-advisory/qsa-24-49
The post QNAP NAS Vulnerabilities Exposed: What You Need to Know to Stay Secure appeared first on Cyble.
Blog – Cyble – Read More
Continuing our mitre series, we will explore how attackers take the first step. As we will later uncover, the same principle applies if we discuss a specific target that threat actors want to attack, or if we analyze large-scale attacks done by a group or with the help of automated tools. Attackers must understand their target before exploiting any vulnerability or delivering any payload.
TechSplicer – Read More
Cryptocurrencies, from Bitcoin to altcoins and meme coins, revolutionize payments by offering privacy, reduced fees, faster transactions, enhanced…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
Operation Destabilise was a major international operation led by the UK’s National Crime Agency (NCA) to dismantle two Russian-speaking criminal networks: Smart and TGR. These networks were backbone in laundering billions of dollars for various criminal activities.
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More