mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.6K
active users

#softwarevulnerability

0 posts0 participants0 posts today
Pyrzout :vm:<p>Turkish Cyber Espionage Campaign Leverages Zero-Day in Output Messenger <a href="https://dailydarkweb.net/turkish-cyber-espionage-campaign-leverages-zero-day-in-output-messenger/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dailydarkweb.net/turkish-cyber</span><span class="invisible">-espionage-campaign-leverages-zero-day-in-output-messenger/</span></a> <a href="https://social.skynetcloud.site/tags/MicrosoftThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MicrosoftThreatIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/SoftwareVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareVulnerability</span></a> <a href="https://social.skynetcloud.site/tags/ZeroDayVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDayVulnerability</span></a> <a href="https://social.skynetcloud.site/tags/nationalsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nationalsecurity</span></a> <a href="https://social.skynetcloud.site/tags/OutputMessenger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OutputMessenger</span></a> <a href="https://social.skynetcloud.site/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a>-2025-27920 <a href="https://social.skynetcloud.site/tags/CyberEspionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberEspionage</span></a> <a href="https://social.skynetcloud.site/tags/TurkishHackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TurkishHackers</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttacks</span></a> <a href="https://social.skynetcloud.site/tags/MarbledDust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MarbledDust</span></a> <a href="https://social.skynetcloud.site/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://social.skynetcloud.site/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://social.skynetcloud.site/tags/Kurdish" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kurdish</span></a> <a href="https://social.skynetcloud.site/tags/Srimax" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Srimax</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 Lazarus Strikes Again: A Deep Dive into Their Latest Campaign 🚨"</p><p>The Lazarus group, known for its relentless cyber-espionage campaigns, has unveiled a new wave of attacks. This time, they compromised a software vendor through unpatched legitimate software. Despite available patches, many systems continued using the flawed software, making them easy prey for Lazarus. 🛡️💻</p><p>The group's modus operandi involved exploiting these software vulnerabilities and then deploying the SIGNBT malware using a DLL side-loading technique. This malware, SIGNBT, communicates with its C2 server and has a unique identifier, making it a signature Lazarus tool. Moreover, the group also deployed LPEClient, a tool previously seen in attacks on defense contractors and the cryptocurrency sector. 🌐🔗</p><p>Lazarus's tactics have evolved, now exploiting high-profile software vulnerabilities to spread their malware efficiently. Their targets span across industries, emphasizing their adaptability and determination. 🎯🌍</p><p>Source: <a href="https://securelist.com/unveiling-lazarus-new-campaign/110888/" rel="nofollow noopener noreferrer" target="_blank">Securelist - Unveiling Lazarus' New Campaign</a></p><p>Tags: <a href="https://infosec.exchange/tags/Lazarus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lazarus</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/SIGNBT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIGNBT</span></a> <a href="https://infosec.exchange/tags/LPEClient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LPEClient</span></a> <a href="https://infosec.exchange/tags/SoftwareVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareVulnerability</span></a> <a href="https://infosec.exchange/tags/CyberEspionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberEspionage</span></a> 🕵️‍♂️🔍🔐</p><p><a href="https://attack.mitre.org/groups/G0032/" rel="nofollow noopener noreferrer" target="_blank">MITRE ATT&amp;CK - Lazarus</a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"Google's Silent Amendment: A Tale of a Critical WebP Vulnerability 🕷️"</p><p>Google has discreetly updated a prior disclosure concerning a critical code-execution vulnerability, initially underplayed as affecting only Chrome, but now revealed to impact thousands of apps and software frameworks. The culprit is the libwebp code library, created by Google for rendering WebP images, which is embedded in numerous apps, operating systems, and code libraries, notably the Electron framework. The vulnerability, initially tagged as CVE-2023-4863, was reclassified as CVE-2023-5129 with a severity rating escalated to a perfect 10. The flaw could allow attackers to execute malicious code merely by tricking users into viewing a corrupted WebP image. It's a stark reminder to ensure your apps, especially those running on Electron versions v22.3.24, v24.8.3, or v25.8.1, are updated to dodge this bullet. 🛡️</p><p>Source: <a href="https://arstechnica.com/security/2023/09/google-quietly-corrects-previously-submitted-disclosure-for-critical-webp-0-day/" rel="nofollow noopener noreferrer" target="_blank">Ars Technica</a> by Dan Goodin. Follow him on <a href="https://twitter.com/dangoodin001" rel="nofollow noopener noreferrer" target="_blank">Twitter</a>.</p><p>Tags: <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://infosec.exchange/tags/WebPVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebPVulnerability</span></a> <a href="https://infosec.exchange/tags/CVE20234863" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE20234863</span></a> <a href="https://infosec.exchange/tags/CVE20235129" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE20235129</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/CodeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CodeExecution</span></a> <a href="https://infosec.exchange/tags/ElectronFramework" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElectronFramework</span></a> <a href="https://infosec.exchange/tags/SoftwareVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareVulnerability</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a></p>
Alexandre Dulaunoy<p>Visualizing vulnerability metrics by merely counting the CVEs per vendor might provide insights into vendors with robust vulnerability disclosure processes. However, it is essential not to overlook the significant blind spot represented by vendors who fail to report any CVEs at all.</p><p>It is crucial to consider the broader picture by acknowledging the existence of vendors who do not actively fill any CVEs, potentially indicating deficiencies in their vulnerability management and disclosure procedures.</p><p>The challenge lies in quantifying unreported vulnerabilities and identifying vendors that fall into this category. How can we account for what has not been disclosed, and how do we go about identifying such vendors?</p><p><a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://infosec.exchange/tags/softwarevulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarevulnerability</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a></p>
Tech News Worldwide<p>Unpatched vulnerabilities in Fortinet and Zoho products come under mass attack <br> <br> <a href="https://arstechnica.com/?p=1919707" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1919707</span><span class="invisible"></span></a> <br> <br> <a href="https://aspiechattr.me/tags/softwarevulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarevulnerability</span></a> <a href="https://aspiechattr.me/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://aspiechattr.me/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://aspiechattr.me/tags/Biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Biz</span></a>&amp;IT</p>