BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories
/in General NewsAdvisories have also been published by Siemens, Schneider Electric, Phoenix Contact and CISA.
The post ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories appeared first on SecurityWeek.
SecurityWeek – Read More
6 sudo tricks every Linux user needs to know – plus 1 just for fun
/in General NewsThe sudo command lets users elevate their privileges to run admin tasks. But it’s far from perfect. These tips can help.
Latest news – Read More
Southeast Asian Scam Centers Face More Financial Sanctions
/in General NewsFirms cooperating with cybercrime syndicates in Burma and Cambodia face sanctions by the US government and enforcement actions by China, but the scams continue to grow.
darkreading – Read More
I tried the Apple Watch Series 11, Watch Ultra 3, and SE – what the keynote didn’t tell you
/in General NewsHere are all the features I’m looking forward to testing further on Apple’s new smartwatch lineup.
Latest news – Read More
This free tool installs Windows 11 on unsupported PCs – without any bloatware
/in General NewsThe free Flyoobe tool can upgrade any Windows 10 PC to a plain, vanilla version of Windows 11.
Latest news – Read More
The best iPhone 17 cases of 2025 (including the Air, Pro, and Max models)
/in General NewsZDNET editors have tested dozens of iPhone cases over the years to help you choose the right one for your new iPhone 17, iPhone 17 Air, iPhone 17 Pro, or iPhone 17 Pro Max.
Latest news – Read More
How to preorder the iPhone 17, iPhone Air, Apple Watch Series 11 and more (plus best deals)
/in General NewsApple just unveiled its new iPhone 17 lineup, plus new Apple Watches, and the AirPods Pro 3. We have the details on where and when you can buy and preorder these devices, and for how much.
Latest news – Read More
Every iPhone 17 model compared: Should you buy the base model, Air, Pro, or Max?
/in General NewsThe iPhone 17 series brings some of the biggest changes that Apple’s mobile devices have ever seen. Use this guide to help decide which model is best for you.
Latest news – Read More
Microsoft Patch Tuesday, September 2025 Edition
/in General NewsMicrosoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no known “zero-day” or actively exploited vulnerabilities in this month’s bundle from Redmond, which nevertheless includes patches for 13 flaws that earned Microsoft’s most-dire “critical” label. Meanwhile, both Apple and Google recently released updates to fix zero-day bugs in their devices.
Microsoft assigns security flaws a “critical” rating when malware or miscreants can exploit them to gain remote access to a Windows system with little or no help from users. Among the more concerning critical bugs quashed this month is CVE-2025-54918. The problem here resides with Windows NTLM, or NT LAN Manager, a suite of code for managing authentication in a Windows network environment.
Redmond rates this flaw as “Exploitation More Likely,” and although it is listed as a privilege escalation vulnerability, Kev Breen at Immersive says this one is actually exploitable over the network or the Internet.
“From Microsoft’s limited description, it appears that if an attacker is able to send specially crafted packets over the network to the target device, they would have the ability to gain SYSTEM-level privileges on the target machine,” Breen said. “The patch notes for this vulnerability state that ‘Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network,’ suggesting an attacker may already need to have access to the NTLM hash or the user’s credentials.”
Breen said another patch — CVE-2025-55234, a 8.8 CVSS-scored flaw affecting the Windows SMB client for sharing files across a network — also is listed as privilege escalation bug but is likewise remotely exploitable. This vulnerability was publicly disclosed prior to this month.
“Microsoft says that an attacker with network access would be able to perform a replay attack against a target host, which could result in the attacker gaining additional privileges, which could lead to code execution,” Breen noted.
CVE-2025-54916 is an “important” vulnerability in Windows NTFS — the default filesystem for all modern versions of Windows — that can lead to remote code execution. Microsoft likewise thinks we are more than likely to see exploitation of this bug soon: The last time Microsoft patched an NTFS bug was in March 2025 and it was already being exploited in the wild as a zero-day.
“While the title of the CVE says ‘Remote Code Execution,’ this exploit is not remotely exploitable over the network, but instead needs an attacker to either have the ability to run code on the host or to convince a user to run a file that would trigger the exploit,” Breen said. “This is commonly seen in social engineering attacks, where they send the user a file to open as an attachment or a link to a file to download and run.”
Critical and remote code execution bugs tend to steal all the limelight, but Tenable Senior Staff Research Engineer Satnam Narang notes that nearly half of all vulnerabilities fixed by Microsoft this month are privilege escalation flaws that require an attacker to have gained access to a target system first before attempting to elevate privileges.
“For the third time this year, Microsoft patched more elevation of privilege vulnerabilities than remote code execution flaws,” Narang observed.
On Sept. 3, Google fixed two flaws that were detected as exploited in zero-day attacks, including CVE-2025-38352, an elevation of privilege in the Android kernel, and CVE-2025-48543, also an elevation of privilege problem in the Android Runtime component.
Also, Apple recently patched its seventh zero-day (CVE-2025-43300) of this year. It was part of an exploit chain used along with a vulnerability in the WhatsApp (CVE-2025-55177) instant messenger to hack Apple devices. Amnesty International reports that the two zero-days have been used in “an advanced spyware campaign” over the past 90 days. The issue is fixed in iOS 18.6.2, iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, and macOS Ventura 13.7.8.
The SANS Internet Storm Center has a clickable breakdown of each individual fix from Microsoft, indexed by severity and CVSS score. Enterprise Windows admins involved in testing patches before rolling them out should keep an eye on askwoody.com, which often has the skinny on wonky updates.
AskWoody also reminds us that we’re now just two months out from Microsoft discontinuing free security updates for Windows 10 computers. For those interested in safely extending the lifespan and usefulness of these older machines, check out last month’s Patch Tuesday coverage for a few pointers.
As ever, please don’t neglect to back up your data (if not your entire system) at regular intervals, and feel free to sound off in the comments if you experience problems installing any of these fixes.
Krebs on Security – Read More
Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights
/in General NewsAfter 25 years at the Electronic Frontier Foundation, Cindy Cohn is stepping down as executive director. In a WIRED interview, she reflects on encryption, AI, and why she’s not ready to quit the battle.
Security Latest – Read More