Tag: Cybersecurity
-
CVE-2024-47575: Critical Vulnerability in Fortinet’s Fortimanager
•
Fortinet has made the news once again with a critical flaw in their software management platform FortiManager which could allow a remote attacker to run code on unpatched systems and, due to the managerial nature of the application, possibly spread further into the network. The vulnerability tracked, as CVE-2024-47575, has…
-
Hacked Robot Vacuums Yell Racial Slurs at Owners
•
Robot Vacuums made by Ecovacs, one of the largest home robotics companies in the world, have reportedly been roving around people’s homes yelling slurs at their owners through the onboard speakers. A critical vulnerability in the company’s software left the robots susceptible to being hacked from afar, allowing attackers to…
-
CISA Orders US Federal Agencies to Patch this Fortinet Flaw!
•
On the 9th of October, CISA revealed a critical vulnerability in Fortinet’s FortiOS, tracked as CVE-2024-23113, being actively exploited in the wild by attackers to achieve Remote Code Execution(RCE). CISA has since added it to its Known Exploited Vulnerabilities Catalogue and ordered US Federal agencies to patch it within 3…
-
Blind Trust in LLMs: How Hallucinated Packages Can Compromise Open-Source Projects
•
Large Language Models(LLMs) have become essential tools for software developers, helping them solve complex problems and even implement entire functionalities in some cases. However, while these models can accelerate development and streamline workflows, over-reliance on them comes with its own set of risks. A well-known flaw of LLMs is their…
-
RAMBO: Stealing Secrets from Isolated Computers
•
Background Prominent researcher Mordechai Guri of the Ben-Gurion University of the Negev, Israel, recently released a research paper detailing a new method that allows attackers to steal sensitive information from air-gapped(isolated) computers. Air-gapped systems are systems that are physically separated from external networks, including the Internet. This is achieved by keeping the…
-
Revival Hijack: A PyPI Supply Chain Attack Technique.
•
Researchers at JFrog have recently discovered a PyPI supply chain attack technique being exploited in the wild, dubbed “Revival Hijack”. This technique can be used to hijack Python packages hosted on PyPI by manipulating the option to re-register(revive) their names once the owner takes them down. A package repository is a centralized…
-
Airport Security Screening can be Bypassed?
•
Security researchers Sam Curry and Ian Carrol discovered a vulnerability in an air transport security system which could allow unauthorized individuals to bypass airport security screenings and even gain access to flight cockpits!
-
Uber Fined 290 Million Euros for GDPR Violations
•
The Dutch Data Protection Authority(DPA) has imposed a fine of 290 Million euros on transport giant Uber for violations of the General Data Protection Regulation(GDPR) in Europe. Uber was found to be transferring the personal data of European taxi drivers to the United States(US) without safeguarding the data being transferred…