article thumbnail

AcidBox, a malware that borrows Turla APT exploit, hit Russian organizations

Security Affairs

The exploit used by Turla, referred to as CVE-2008-3431 , abuses two vulnerabilities, but only one was ever fixed in the aforementioned CVE. The other vulnerability was chained by Turla operators with the CVE-2008-3431 flaw in the first version of their exploit. but also all other versions up to v3.0.0. of the driver.

Malware 144
article thumbnail

Microsoft rolled out emergency update for Windows PrintNightmare zero-day

Security Affairs

Cybersecurity #Infosec — US-CERT (@USCERT_gov) June 30, 2021. 2008 and 2012 but require Point&Print configured for Windows 2016,2019,10 & 11(?). CERT/CC has released a Vulnerability Note flagging a critical remote code execution vulnerability “PrintNightmare“ in the Windows Print spooler service. Learn more at [ [link] ].

InfoSec 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RCE vulnerability in OpenSSH – RegreSSHion (CVE-2024-6387)

Pen Test Partners

Versions before 4.4p1 are also vulnerable unless patches for CVE-2006- 5051 and CVE-2008-4109 have been applied. There has been a lot of talk on various infosec news feeds about the RegreSSHion vulnerability. The CVE is a high-severity remote unauthenticated code execution vulnerability affecting glibc-based Linux systems.

InfoSec 83
article thumbnail

CloudWizard APT: the bad magic story goes on

SecureList

Over the years, the infosec community has discovered multiple APTs operating in the Russo-Ukrainian conflict region – Gamaredon, CloudAtlas , BlackEnergy and many others. Operation Groundbait was first described by ESET in 2016, with the first implants observed in 2008.

article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

Enter BackTrack 3 in June 2008. 2008 was no exception. In information security (infosec) there is the need to be on the latest version. Writing exploits or developing infosec tools is no exception, they often need to have access to the latest libraries. Times were different to how it is now. How did you pick the name?

InfoSec 52
article thumbnail

Verizon 2025 DBIR: Tenable Research Collaboration Shines a Spotlight on CVE Remediation Trends

Security Boulevard

Background Since 2008, Verizons annual Data Breach Investigations Report (DBIR) has helped organizations understand evolving cyber threats. Security isnt just for infosec professionals its everyones responsibility. To support the report, Tenable Research contributed enriched data on the most exploited vulnerabilities.

article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

Vamosi: For this episode I also want to weigh in on a very controversial topic within infosec today. Now, if you’ve been around infosec for any length of time, you are probably thinking about Diffie-Hellman, RSA, Elliptical Curve, even SHA. Vamosi: There’s this saying in infosec about never rolling your own encryption.