Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $20,305
25%  
Woo hoo!! And we're now over 25%!! Thank you all very much!! God bless.

Keyword: zeroday

Brevity: Headers | « Text »
  • Internet is scrambling to fix Log4Shell, the worst hack in history

    12/12/2021 9:08:33 PM PST · by blueplum · 30 replies
    BGR via msn ^ | 12 December 2021 | Chris Smith
    Massive data breaches have become so common that we’ve gotten numb to reports detailing another hack or 0-day exploit. That doesn’t reduce the risk of such events happening, as the cat-and-mouse game between security experts and hackers continues. As some vulnerabilities get fixed, others pop up requiring attention from product and service providers. The newest one has a name that will not mean anything to most people. They call the hack Log4Shell in security briefings, which doesn’t sound very scary. But the new 0-day attack is so significant that some people see it as the worst internet hack in history.......
  • DHS warns of critical flaw in widely used software [Log4j]

    12/12/2021 6:20:07 PM PST · by BenLurkin · 8 replies
    CNN ^ | December 11, 2021 | Sean Lyngaas,
    The vulnerability is in Java-based software known as "Log4j" that large organizations, including some of the world's biggest tech firms, use to configure their applications. Apple's cloud computing service, security firm Cloudflare and one of the world's most popular video games, Minecraft, are among the organizations that run Log4j, according to security researchers. The vulnerability can offer a hacker a relatively easy way to access an organization's computer server. From there, an attacker could devise other ways to access systems on an organization's network. Security experts say that the fallout from the software flaw could continue for days and weeks...
  • EDITORS' PICK|Sep 17, 2021,11:18am EDT|24,495 views Exclusive: An American Company Fears Its Windows Hacks Helped India Spy On China And Pakistan

    09/18/2021 8:33:50 AM PDT · by American Number 181269513 · 9 replies
    Forbes ^ | Sep 17, 2021 | Thomas Brewster
    Earlier this year, researchers at Russian cybersecurity firm Kaspersky witnessed a cyberespionage campaign targeting Microsoft Windows PCs at government and telecom entities in China and Pakistan. They began in June 2020 and continued through to April 2021. What piqued the researchers’ interest was the hacking software used by the digital spies, whom Kaspersky had dubbed Bitter APT, a pseudonym for an unspecified government agency. Aspects of the code looked like some the Moscow antivirus provider had previously seen and attributed to a company it gave the cryptonym “Moses.” Moses, said Kaspersky, was a mysterious provider of hacking tech known as...
  • Windows 10 (and prior) bug corrupts your hard drive on seeing this file's icon (Zero-day, not fixed)

    01/15/2021 8:43:27 AM PST · by dayglored · 43 replies
    Bleeping Computer ^ | Jan 14, 2021 | Ax Sharma
    An unpatched zero-day in Microsoft Windows 10 (and prior) allows attackers to corrupt an NTFS-formatted hard drive with a one-line command. In multiple tests by BleepingComputer, this one-liner can be delivered hidden inside a Windows shortcut file, a ZIP archive, batch files, or various other vectors to trigger hard drive errors that corrupt the filesystem index instantly. "Critically underestimated" NTFS vulnerability In August 2020, October 2020, and finally this week, infosec researcher Jonas L drew attention to an NTFS vulnerability impacting Windows 10 that has not been fixed. When exploited, this vulnerability can be triggered by a single-line command to...
  • Windows 7 Zero-Day Unpatched Vulnerability Is Being Exploited in the Wild (my title)

    03/08/2019 8:34:11 PM PST · by dayglored · 19 replies
    Google Security Blog ^ | Mar 7, 2019 | Clement Lecigne
    Article title: "Disclosing vulnerabilities to protect users across platforms" ... The second vulnerability was in Microsoft Windows. It is a local privilege escalation in the Windows win32k.sys kernel driver that can be used as a security sandbox escape... We strongly believe this vulnerability may only be exploitable on Windows 7 due to recent exploit mitigations added in newer versions of Windows. To date, we have only observed active exploitation against Windows 7 32-bit systems. Pursuant to Google’s vulnerability disclosure policy, when we discovered the vulnerability we reported it to Microsoft. Today, also in compliance with our policy, we are publicly...
  • Google wants you to update Chrome right now (ZERO-DAY Exploit in Chrome Browser)

    03/08/2019 7:49:10 AM PST · by dayglored · 46 replies
    TechSpot ^ | Mar 7, 2019 | Dean Pennington
    Bottom line: Google is urging Chrome users to update their browsers immediately after a zero-day exploit that could give hackers direct access to a user's OS has been found. The most recent version is 72.0.3626.121, and it's the version you want to be running to make sure you're safe from this exploit. Google is urging users to update Chrome across all platforms after a critical vulnerability was discovered and patched. The vulnerability exploits a security flaw known as CVE-2019-5786. The security flaw is a memory management issue in Chrome's FileReader which gives hackers the opportunity to inject and execute malicious...
  • Google clashes with Microsoft over Windows flaw disclosure (actively exploited zero-day vuln)

    10/31/2016 6:41:58 PM PDT · by dayglored · 25 replies
    PC World ^ | Oct 31, 2016 | Michael Kan
    Google and Microsoft are butting heads over the disclosure of vulnerabilities. On Monday, Google revealed a critical flaw in Windows after it gave Microsoft a ten-day window to warn the public about it.Google posted about the zero-day vulnerability on its security blog, saying Microsoft had yet to publish a fix or issue an advisory about the software flaw."This vulnerability is particularly serious because we know it is being actively exploited," Google said. It lets hackers exploit a bug in the Windows kernel, via a win32k.sys system call, to bypass the security sandbox.The search giant originally told Microsoft about the problem...
  • Lenovo hunts BIOS backdoor bandits

    07/05/2016 7:32:33 PM PDT · by Utilizer · 12 replies
    iTnews (AUS) ^ | Jul 6 2016 6:06AM (AUS) | Juha Saarinen
    PC giant Lenvo has launched an investigation with Intel to find out which of its suppliers introduced the recently-disclosed BIOS level "ThinkPwn" vulnerability that allows attackers to bypass hardware protections on the company's ThinkPad laptops and other computers. Researcher Dmytro Oleksiuk discovered a flaw that allowed arbitrary code execution using the Intel system management mode (SMM) feature in processors. The exploit is able to bypass the write protection in PCs' flash memory, and in turn disable the Unified Extensible Firmware Interface (UEFI) Secure Boot, and the Windows 10 Enterprise Credentials Guard security feature. Oleksiuk also found suspicious SMM code in...
  • Lenovo scrambling to get a fix for BIOS vuln

    07/04/2016 7:04:05 PM PDT · by Utilizer · 19 replies
    The Register ^ | 4 Jul 2016 at 02:04 | Richard Chirgwin
    Lenovo, and possibly other PC vendors, is exposed to a UEFI bug that can be exploited to disable firmware write-protection. If the claims made by Dmytro Oleksiuk at Github are correct, an attacker can “disable flash write protection and infect platform firmware, disable Secure Boot, [and] bypass Virtual Secure Mode (Credential Guard, etc.) on Windows 10 Enterprise.” The reason Oleksiuk believes other vendors are also vulnerable is that the buggy code is inherited from Intel. He writes that the SystemSmmRuntimeRt was copied from Intel reference code.
  • Lenovo ThinkPad zero-day bypasses Windows security

    07/03/2016 4:15:43 PM PDT · by Utilizer · 32 replies
    iTnews (AUS) ^ | Jul 4 2016 6:41AM (AUS) | Juha Saarinen
    A researcher has discovered a new low-level zero-day exploit that overrides the protection for the firmware code in Lenovo ThinkPads and other laptops, bypassing hardware and Windows security features. Last week, Dmytro Oleksiuk, also known as cr4sh, released the code for his ThnkPwn proof of concept on Github, showing how it can be used to exploit a flaw in the unified extensible firmware interface (UEFI) driver for privilege escalation. This lets attackers remove the write protection for system flash memory, and allows them to run arbitrary code with full access to the entire victim system. Lenovo had not received advance...
  • Windows 10 zero day selling for $90,000 (how exploits are marketed on crime forums)

    06/01/2016 6:17:10 AM PDT · by dayglored · 9 replies
    The Register ^ | Jun 1, 2016 | Darren Pauli
    A Windows zero day vulnerability granting hackers deeper access to compromised machines is being sold for US$90,000. The local privilege escalation vulnerability is being sold on crime forum exploit.in and promises to help attackers who already have access to hacked machines. Seller BuggiCorp claims in a sales thread and proof-of-concept videos that the local privilege escalation works on Windows systems from version 2000 to the considerably more secure 10. It works in the presence of Microsoft's lauded enhanced mitigation toolkit which introduces many security features baked into Windows 10 to older platforms. Researchers from Trustwave's Spiderlabs team, who found the...
  • NEW Adobe Flash Zero-day Vulnerability / Exploit - Uninstall Flash Today From All Computers

    10/15/2015 11:34:56 AM PDT · by dayglored · 63 replies
    (vanity, multiple sources) ^ | Oct 15, 2015 | (vanity, multiple sources)
    Yet another bad new Zero-Day (already exploited) Adobe Flash vulnerability. Time to uninstall Flash from all your computers and keep it off for good! To remove Flash from Windows: Close your browser In Control Panel -> Programs and Features, remove/uninstall all Adobe Flash or Shockwave items. Restart your browser Go to Add-ons/Plugins and confirm there are no Shockwave or Flash plugins. To remove Flash from OS X (10.6 and later): Download and run this Flash uninstaller: http://fpdownload.macromedia.com/get/flashplayer/current/support/uninstall_flash_player_osx.dmg To remove Flash from Linux: Close your browser Use "apt-get remove", "yum erase", or find the flashplayer .so (e.g. in /usr/lib[64]/mozilla/plugins or ~/.mozilla/plugins)...
  • TWO MORE Flash zero-days emerge in Hacking Team leak – crims (criminals) exploit holes

    07/12/2015 6:49:06 AM PDT · by dayglored · 16 replies
    The Register ^ | July 12, 2015 | Chris Williams
    Updated -- Two more serious security holes in Adobe Flash that let miscreants hijack vulnerable computers have emerged from the leaked Hacking Team files – and crooks are apparently already exploiting at least one of them to infect machines. The use-after-free() programming flaws, for which no patches exist, are identified as CVE-2015-5122 and CVE-2015-5123. They are similar to the CVE-2015-5119 Flash bug patched last week. The 5122 and 5123 bugs let malicious Flash files execute code on victims' computers and install malware. The bugs are present in the Windows, Linux and OS X builds of the plugin. The 5119, 5122...
  • New zero day vulnerability identified in all versions of IE

    04/27/2014 4:26:55 PM PDT · by dayglored · 95 replies
    Cnet ^ | Apr 27, 2014 | Steven Musil
    A new zero day vulnerability that resides in all versions of Internet Explorer has been spotted in the wild, Microsoft confirmed late Saturday. The vulnerability, which could allow remote code execution, is being used in "limited, targeted attacks," according to an advisory issued by Microsoft. While all versions of the web browser, IE 6 through 11, are affected by the vulnerability, attacks are currently targeting IE versions 9, 10 and 11, according to security firm Fire Eye, which first reported the flaw Friday. The attack leverages a previously unknown "use after free" vulnerability -- data corruption that occurs after memory...
  • Patch Tuesday: Microsoft raises alert for dangerous IE, Windows flaws

    06/13/2012 9:39:00 PM PDT · by OldEarlGray · 77 replies
    ZDnet ^ | 12 Jun 2012 | Ryan Naraine
    Summary: Microsoft expects to see exploit code targeting at least one of the vulnerabilities within the next 30 days. Microsoft today warned that cyber-criminals could soon aim exploits at critical security flaws in Internet Explorer browser and Windows to hijack and take complete control of vulnerable machines. The warning comes as part of this month’s Patch Tuesday where Microsoft released 7 bulletins with fixes for at least 26 documented vulnerabilities affecting the Windows ecosystem. The company is urging users to pay special attention to MS12-037 and MS12-036, which provides cover for “remote code execution” vulnerabilities that could be used in...
  • NSA INTERCEPTED PRE-9/11 OMINOUS MESSAGES

    06/20/2002 1:07:11 AM PDT · by kattracks · 1 replies · 303+ views
    New York Post ^ | 6/20/02 | VINCENT MORRIS and BRIAN BLOMQUIST
    <p>June 20, 2002 -- WASHINGTON - The nation's eavesdropping agency intercepted ominous messages on Sept. 10 - "The match begins tomorrow" and "Tomorrow is zero day" - but nothing was done until it was too late, sources said yesterday.</p> <p>The National Security Agency didn't translate the pair of pre-9/11 Arabic-language messages until Sept. 12, the day after the terror attacks, intelligence officials told a congressional panel.</p>
  • Sept. 11 Leak Probe Focuses on Sen. Shelby, Paper Reports

    01/22/2004 12:56:18 AM PST · by kcvl · 52 replies · 322+ views
    Reuters | 01.22.04 | Unknown
    WASHINGTON (Reuters) - A U.S. Justice Department probe of the leak of classified information about intercepted messages prior to the Sept. 11 attacks is focusing on Sen. Richard Shelby, former chairman of the Senate intelligence committee, The Washington Post reported on Thursday. The newspaper cited a law enforcement official and congressional sources as saying that the probe has focused on the Alabama Republican who was head of the intelligence panel at the time of the disclosure. The FBI is trying to determine the source of the leaked information that the super secret National Security Agency (NSA) had intercepted two messages...