Category: Security

  • Vulnerability Assessments vs. Penetration Testing: Key Differences

    Organizations enhance their information security with Penetration Testing (Pen Testing) and Vulnerability Assessments (VAs). VAs identify and rank vulnerabilities, aiding in prioritizing remediation. VM goes beyond VAs, involving asset discovery, consistent scanning, patch management, and risk assessment. On the other hand, Pen Testing actively exploits vulnerabilities to assess potential damage. Netizen offers comprehensive security solutions…

  • Invasive Data Scraping Service “Spy Pet” Sells Discord User Data for as Low as $5

    A data scraping service known as Spy Pet has sparked privacy concerns by selling extensive user data from Discord. With a claimed 600 million user database, Spy Pet offers user profiles and activity details for a minimal fee. Discord is actively investigating the matter. The incident emphasizes the need for clearer regulations protecting user privacy.

  • Telegram Responds to Python Script Execution Vulnerability in Windows App

    Telegram addressed a critical security issue in its Windows desktop app, debunking initial rumors of a zero-click flaw. After a typo in the code enabled Python scripts to run without warning, exploiters disguised them as videos. Telegram swiftly fixed the issue and plans to enhance security for future versions.

  • Analysis of CVE-2024-31497: Biased ECDSA Nonce Generation in PuTTY

    CVE-2024-31497 is a critical vulnerability in PuTTY SSH client versions 0.68 to 0.80, allowing recovery of a user’s private key due to biased nonce generation. Attackers can exploit this, posing serious threats. Several applications are also affected. Users must upgrade, revoke vulnerable keys, and update dependent applications to mitigate the risk and prevent breaches.

  • Palo Alto Networks Acts on Zero-Day Vulnerability in PAN-OS Firewalls

    Palo Alto Networks has released critical updates to fix a zero-day vulnerability (CVE-2024-3400) in its firewall operating system PAN-OS. The flaw allows unauthenticated attackers to gain root access through command injection in the GlobalProtect gateway/portal. Hotfixes are available, and customers are advised to apply mitigation measures. The U.S. CISA has also mandated actions to address…

  • The Loop DoS Attack: A New Threat to UDP-Based Protocols

    A new “Loop DoS” attack exploits UDP-based application-layer protocols, potentially affecting thousands of systems. It involves servers engaging in continuous communication, depleting their resources and rendering them unresponsive. Despite no reported real-world instances, an estimated 300,000 hosts could be exploited. Initiatives like BCP38 filtering spoofed traffic aim to mitigate risks.

  • Ransomware Attack Triggers Panera Bread’s Nationwide IT Outage

    In March 2024, Panera Bread faced a ransomware attack causing disruptions to IT systems and services. Online and in-store operations were affected, prompting the company to seek customer patience and resort to cash transactions. The attack’s timing suggests calculated planning, reflecting a trend of cyberattacks on the food service industry.

  • The HTTP/2 Continuation Flood: A New Era of Denial-of-Service Threats Emerges

    Cybersecurity expert Bartek Nowotarski revealed a new denial-of-service (DoS) attack strategy, the HTTP/2 Continuation Flood, posing a severe threat to organizations. Numerous vulnerabilities within HTTP/2 implementations have been identified, each with distinct CVE identifiers, presenting a range of DoS exploits. Immediate assessment, patching, enhanced monitoring, collaboration and sharing, and vendor communication are essential for protection.

  • CVE-2024-3094: The Backdoor Impacting Versions 5.6.0 and 5.6.1 of XZ Utils

    A recent backdoor in xz/liblzma has raised concerns in the software industry. The culprit, who posed as a benign contributor, managed to introduce vulnerabilities into the open-source software. The security community has since taken action, but the incident highlights the challenges of open-source development..

  • Netizen Cybersecurity Bulletin (March 31st, 2024)

    Online retailer PandaBuy was compromised, exposing 1.3 million customers’ data, prompting users to change passwords and enable two-factor authentication. Similarly, a ransomware attack affected over 2.8 million individuals through Massachusetts Health Insurer, triggering lawsuits and the offer of credit monitoring.