Remove Architecture Remove Authentication Remove Hacking Remove Information Security
article thumbnail

Multiple Brocade SANnav SAN Management SW flaws allow device compromise

Security Affairs

The following vulnerabilities, discovered by the security researcher Pierre Barre , impact all versions up to 2.3.0 The following vulnerabilities, discovered by the security researcher Pierre Barre , impact all versions up to 2.3.0 These switches are running Linux and are powerful. They are ideal to host implants.”

Firewall 111
article thumbnail

Cuttlefish malware targets enterprise-grade SOHO routers

Security Affairs

A new malware named Cuttlefish targets enterprise-grade and small office/home office (SOHO) routers to harvest public cloud authentication data. Cuttlefish has a modular structure, it was designed to primarily steal authentication data from web requests passing through the router from the local area network (LAN).

Malware 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Akira ransomware received $42M in ransom payments from over 250 victims

Security Affairs

A joint advisory published by CISA, the FBI, Europol, and the Netherlands’ National Cyber Security Centre (NCSC-NL) revealed that since early 2023, Akira ransomware operators received $42 million in ransom payments from more than 250 victims worldwide. The attackers mostly used Cisco vulnerabilities CVE-2020-3259 and CVE-2023-20269.

article thumbnail

PACMAN, a new attack technique against Apple M1 CPUs

Security Affairs

PACMAN is a new attack technique demonstrated against Apple M1 processor chipsets that could be used to hack macOS systems. PACMAN is a novel hardware attack technique that can allow attackers to bypass Pointer Authentication (PAC) on the Apple M1 CPU. ” reads the research paper published by the researchers.

article thumbnail

Cisco SD-WAN flaw could lead to arbitrary code execution, patch it now!

Security Affairs

Cisco SD-WAN is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises, it allows to connect disparate office locations via the cloud. An authenticated, local attacker can exploit the CVE-2021-1529 vulnerability to execute arbitrary commands with root privileges. Pierluigi Paganini.

article thumbnail

Dark Mirai botnet spreads targeting RCE on TP-Link routers

Security Affairs

TPLINK #cybersecurity #rce #cve #hacking #routerhacking #kpmghungary I found an RCE vulnerability in a TP-Link TL-WR840N EU V5 router (CVE-2021-41653). Below are the two requests sent to the devices to compromise them: The researchers pointed out that successful exploitation requires authentication of the routers. Pierluigi Paganini.

Firmware 144
article thumbnail

EvilProxy used in massive cloud account takeover scheme

Security Affairs

. “Threat actors utilized EvilProxy – a phishing tool based on a reverse proxy architecture, which allows attackers to steal MFA-protected credentials and session cookies.” EvilProxy actors use Reverse Proxy and Cookie Injection methods to bypass 2FA authentication – proxyfying victim’s session.