<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Malicious News]]></title><description><![CDATA[Cyber Security News]]></description><link>https://maliciousnews.com/</link><image><url>https://maliciousnews.com/favicon.png</url><title>Malicious News</title><link>https://maliciousnews.com/</link></image><generator>Ghost 5.69</generator><lastBuildDate>Tue, 07 Apr 2026 22:35:12 GMT</lastBuildDate><atom:link href="https://maliciousnews.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[CISA Emergency Directive to Federal Agencies Regarding Ivanti Zero-Day Exploits]]></title><description><![CDATA[<p>In a recent development, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency <a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities?ref=maliciousnews.com" rel="noreferrer">directive</a> on Friday, urging Federal Civilian Executive Branch (FCEB) agencies to implement mitigations against two actively exploited zero-day flaws found in Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) products.</p><p>The vulnerabilities, namely</p>]]></description><link>https://maliciousnews.com/cisas-emergency-directive-to-federal-agencies-regarding-ivanti-zero-day-exploits/</link><guid isPermaLink="false">65ac93fb55b4ee0370bbdc0f</guid><category><![CDATA[Vulnerabilities]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Tue, 23 Jan 2024 16:25:23 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/2024/01/DreamShaper_v7_computer_monitor_virus_warning_wallpaper_1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://maliciousnews.com/content/images/2024/01/DreamShaper_v7_computer_monitor_virus_warning_wallpaper_1.jpg" alt="CISA Emergency Directive to Federal Agencies Regarding Ivanti Zero-Day Exploits"><p>In a recent development, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency <a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities?ref=maliciousnews.com" rel="noreferrer">directive</a> on Friday, urging Federal Civilian Executive Branch (FCEB) agencies to implement mitigations against two actively exploited zero-day flaws found in Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) products.</p><p>The vulnerabilities, namely an authentication bypass (CVE-2023-46805) and a code injection bug (CVE-2024-21887), have been subjected to widespread exploitation by multiple threat actors. These flaws empower malicious actors to craft harmful requests and execute arbitrary commands on the affected systems.</p><p><a href="https://forums.ivanti.com/s/article/Recovery-Steps-Related-to-CVE-2023-46805-and-CVE-2024-21887?language=en_US&amp;ref=maliciousnews.com" rel="noreferrer">Acknowledging</a> a significant increase in threat actor activity since January 11, 2024, Ivanti revealed the potential consequences of successful exploitation. Threat actors could move laterally, perform data exfiltration, and establish persistent system access, ultimately leading to the full compromise of target information systems.</p><p>Ivanti plans to release an update to address the flaws in the coming week. In the interim, a temporary workaround has been provided through an XML file, allowing affected products to undergo necessary configuration changes.</p><p>CISA is urging organizations using ICS to promptly apply the mitigation measures. They recommend running an External Integrity Checker Tool to identify signs of compromise. If compromise is detected, organizations are advised to disconnect affected systems from networks, reset devices, and import the provided XML file.</p><p>Threat intelligence firm GreyNoise reported opportunistic exploitation by bad actors for financial gain. They <a href="https://www.greynoise.io/blog/ivanti-connect-secure-exploited-to-install-cryptominers?ref=maliciousnews.com" rel="noreferrer">observed</a> the vulnerabilities being abused to drop persistent backdoors and XMRig cryptocurrency miners, emphasizing the multifaceted threats posed by these actively exploited zero-day flaws.</p>]]></content:encoded></item><item><title><![CDATA[Admin Takeover Flaw In Synology DiskStation Manager]]></title><description><![CDATA[<p>A  vulnerability has been identified in Synology&apos;s DiskStation Manager (<a href="https://www.synology.com/en-global/dsm?ref=maliciousnews.com" rel="noreferrer">DSM</a>), capable of being exploited to uncover an administrator&apos;s password and seize control of the account remotely.</p><p>According to Sharon Brizinov from Claroty&apos;s Team82 in a <a href="https://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure?ref=maliciousnews.com" rel="noreferrer">report</a> on Tuesday, &quot;Under some rare conditions, an</p>]]></description><link>https://maliciousnews.com/flaw-dsm/</link><guid isPermaLink="false">652c1b2276a01103292d5d6b</guid><category><![CDATA[Vulnerabilities]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Fri, 20 Oct 2023 17:00:00 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/2023/11/flaw-dsm.png" medium="image"/><content:encoded><![CDATA[<img src="https://maliciousnews.com/content/images/2023/11/flaw-dsm.png" alt="Admin Takeover Flaw In Synology DiskStation Manager"><p>A  vulnerability has been identified in Synology&apos;s DiskStation Manager (<a href="https://www.synology.com/en-global/dsm?ref=maliciousnews.com" rel="noreferrer">DSM</a>), capable of being exploited to uncover an administrator&apos;s password and seize control of the account remotely.</p><p>According to Sharon Brizinov from Claroty&apos;s Team82 in a <a href="https://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure?ref=maliciousnews.com" rel="noreferrer">report</a> on Tuesday, &quot;Under some rare conditions, an attacker could leak enough information to restore the seed of the pseudorandom number generator (PRNG), reconstruct the admin password, and remotely take over the admin account.&quot;</p><p>This flaw, labeled <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2729?ref=maliciousnews.com" rel="noreferrer">CVE-2023-2729</a>, holds a severity rating of 7.5 on the CVSS scoring scale and was addressed by Synology through updates released in June 2023.</p><p>The root of the issue lies in the software&apos;s utilization of a weak random number generator, relying on the JavaScript Math.random() method to construct the admin password for the network-attached storage (NAS) device.</p><p>Sharon Brizinov elaborated on the attack, stating, &quot;By leaking the output of a few Math.Random() generated numbers, we were able to reconstruct the seed for the PRNG and use it to brute-force the admin password. Finally, we were able to use the password to log in to the admin account (after enabling it).&quot;</p><p>However, the success of the attack relies on the attacker extracting a few GUIDs during the setup process, generated using the same method. In a real-life scenario, the attacker would first need to leak the GUIDs, brute force the Math.Random state, and gain access to the admin password. Even then, the default setting disables the built-in admin user account, and most users won&apos;t enable it.</p><p></p>]]></content:encoded></item><item><title><![CDATA[How to Boost Your Security with a Password Manager]]></title><description><![CDATA[<div class="wp-block-uagb-advanced-heading uagb-block-2d0016cc"><h2 class="uagb-heading-text">Introduction</h2></div>



<p>Are you tired of keeping track of all your passwords? Do you have trouble remembering which combination goes with what account? Enter the password manager.</p>



<p>A password manager is a software program that securely stores and manages all your login information for various websites and applications. With just one</p>]]></description><link>https://maliciousnews.com/how-to-boost-your-security-with-a-password-manager/</link><guid isPermaLink="false">652c1b2276a01103292d5d6e</guid><category><![CDATA[General Security]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Mon, 26 Jun 2023 08:38:25 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2023/06/lock-banner.png" medium="image"/><content:encoded><![CDATA[
<div class="wp-block-uagb-advanced-heading uagb-block-2d0016cc"><h2 class="uagb-heading-text">Introduction</h2></div>



<img src="https://maliciousnews.com/content/images/wordpress/2023/06/lock-banner.png" alt="How to Boost Your Security with a Password Manager"><p>Are you tired of keeping track of all your passwords? Do you have trouble remembering which combination goes with what account? Enter the password manager.</p>



<p>A password manager is a software program that securely stores and manages all your login information for various websites and applications. With just one master password, you can access all your other passwords.</p>



<p>But why do you need a password manager? First, it eliminates the need to remember multiple passwords, and it also allows you to use strong, unique passwords for each account without the hassle of trying to recall them. Additionally, it provides an extra layer of security for your online accounts.</p>



<p>with a password manager, you don&#x2019;t have to worry about writing down your passwords on a notepad or using the same password for multiple accounts. So, would you rather go old-school with pen and paper or up your security game with a password manager?</p>



<div class="wp-block-uagb-advanced-heading uagb-block-22dc6d23"><h2 class="uagb-heading-text">How Password Managers Work</h2></div>



<p>Imagine a world where you don&#x2019;t have to remember all your passwords for every other account. With password managers, you can wave goodbye to that problem.</p>



<p>How do password managers work? Let&#x2019;s dive in.</p>



<p>The Encryption Process is the backbone of a password manager that ensures the security of your passwords. It encrypts your passwords using robust encryption algorithms, making it difficult for hackers to access it.</p>



<p>Multiple devices &#x2013; with password managers, you get the convenience to access your passwords from different devices like your smartphone or laptop.</p>



<p>Auto-fill Functionally &#x2013; you no longer have to worry about typing your long and complicated passwords manually. Password managers allow you to auto-fill passwords, and remove the risk of making spelling errors.3</p>



<p>Password Generator &#x2013; With a password manager, you don&#x2019;t have to come up with creative new passwords. The password manager generates strong, unique passwords with a mix of characters to ensure maximum security.</p>



<p>Password managers put you in control of your security while saving you time. Now, let&#x2019;s explore the benefits of using a password manager!</p>



<div class="wp-block-uagb-advanced-heading uagb-block-daeaf3cc"><h2 class="uagb-heading-text">Benefits of Password Managers</h2></div>



<p>Introduction</p>



<p>As we navigate our daily lives, we are constantly bombarded by the need to create and remember passwords for various accounts and platforms. With so many passwords to remember, its no wonder that most people opt for the easy-to-remember ones, but this sets the stage for a security breach.</p>



<p>Definition of a Password Manager</p>



<p>A password manager simplifies the process of creating and remembering passwords by storing them securely in an encrypted database. All you need to do is remember one master password, and the password manager tool will take care of the rest!</p>



<p>Why you need a Password Manager?</p>



<p>With a password manager, you can create complex passwords that are unique for each account, making it challenging for cyber criminals to hack your accounts. It saves time as you don&#x2019;t have to remember all the passwords separately. Besides, they help you conduct an audit of your existing password strength and alert you if there are any duplicate or weak passwords.</p>



<p>How Password Managers Work</p>



<p>The encryption process ensures that all your data is safely stored in a digital locker. One of the best features of password managers is that they work seamlessly across multiple devices. Additionally, the auto-fill functionality saves you the trouble of typing your passwords for every login. And let&#x2019;s not forget about the password generator that is a lifesaver when you need to create complex and secure passwords.</p>



<p>Benefits of Password Mangers</p>



<p>Increased Security</p>



<p>With a password manager, you don&#x2019;t have to worry about weak passwords being compromised, and you can enjoy multi-factor authentication, which adds an extra layer of security.</p>



<p>Ease-of-Use</p>



<p>Password managers make it easy to store and remember passwords, and you don&#x2019;t have to stress over memorizing them. With one Master password, all your passwords are secure and easily accessible.</p>



<p>Time-Saving</p>



<p>By streamlining the process of creating, storing, and recalling passwords, password managers boost your productivity by saving your time for other productive activities.</p>



<p>Audit</p>



<p>Password managers carry out periodic password strength checks and alert you whenever they detect weak passwords or any duplicates that can compromise your security.</p>



<p>Popular Password Managers in the Market</p>



<ol>
<li>LastPass</li>



<li>1Password</li>



<li>Dashlane</li>



<li>Keeper</li>



<li>Bitwarden</li>
</ol>



<p>Choosing the Right Password Manger</p>



<p>When selecting a password manager, you&#x2019;d have to pay attention to factors such as costs, cross-platform compatibility, UI, and additional features. With so many options in the market, it&#x2019;s essential to review and compare them before making your final decision.</p>



<p>Tips on Setting Strong Passwords</p>



<p>Avoid repeating passwords across different accounts, avoid common passwords, and make them longer! Additionally, use mixed characters such as numbers, letters, and symbols to make it harder to guess.</p>



<p>Recap of the Benefits of a Password Manager</p>



<p>Without a password manager, password management can seem daunting. But with password managers, you can enjoy increased security, ease-of-use, time-saving benefits, and periodic password audits to maintain your account&#x2019;s safety.</p>



<p>Final Thoughts</p>



<p>Staying safe online is critical, and a password manager offers a seamless solution to password management that saves time and provides peace of mind. So, what are you waiting for? Choose a password manager today and stay secure.</p>



<div class="wp-block-uagb-advanced-heading uagb-block-f66528c4"><h2 class="uagb-heading-text">Popular Password Managers in the Market</h2></div>



<p>You know what&#x2019;s more stressful then remembering all the passwords for your various accounts? Not having a secure password manager to help you out! Well,  let&#x2019;s take a look at some of the popular password managers on the market.</p>



<p>First up we have <a href="https://www.lastpass.com/?ref=maliciousnews.com" target="_blank" rel="noopener" title><strong>LastPass</strong></a>. It&#x2019;s free to download and has a user-friendly interface. It can also be used on a variety of platforms. LastPass offers free version as well as a premium option.</p>



<p><a href="https://www.1password.com/?ref=maliciousnews.com" target="_blank" rel="noopener" title="1Password"><strong>1Password</strong></a>, on the other hand has great support. Robust vault organization features, plus excellent travel mode. Unfortunately there is no free version.</p>



<p><strong><a href="https://www.dashlane.com/?ref=maliciousnews.com" target="_blank" rel="noopener" title="Dashlane">Dashlane</a></strong> offers an excellent VPN service and enables users to store their passwords securely in their vault. It also comes with an interface that allows you to setup an emergency contact if you ever forget your master password. But it comes with a price tag. </p>



<p><strong><a href="https://www.keepersecurity.com/?ref=maliciousnews.com" target="_blank" rel="noopener" title="Keeper">Keeper</a></strong> offers both a free and paid version, along with a personal and business enterprise option. It comes with fingerprint login, automated backup, and 24/7 support.</p>



<p>And lastly, <strong><a href="https://bitwarden.com/?ref=maliciousnews.com" target="_blank" rel="noopener" title="Bitwarden">Bitwarden</a></strong>, which is an open-source password manager with a free and premium version. Its features include auto-filling of passwords, multi-device sync and sharing, and secure password generation.</p>



<p>So, go ahead and take your pick! But remember, it&#x2019;s not just about the password manager, but also about the password you create for your online accounts. Stay safe out there.</p>



<div class="wp-block-uagb-advanced-heading uagb-block-b1d1f2e7"><h2 class="uagb-heading-text">Choosing the Right Password Manager</h2></div>



<p>Choosing the right password manager can be a daunting task. With so many options available, it&#x2019;s easy to get overwhelmed. But don&#x2019;t worry, we&#x2019;ve got you covered. Here are some key factors to consider while choosing a password manager. </p>



<p>Firstly, costs. While some password managers come for free, others charge a. subscription fee. It&#x2019;s essential to choose a password manager which suits your budget.</p>



<p>Secondly, cross-platform compatibility. Ensure that the password manager is compatible with the devices and operating systems you use. You don&#x2019;t want to spend money on password manger that doesn&#x2019;t work on your devices.</p>



<p>Thirdly, additional features. Password managers come with different features such as breach alerts, two-factor authentication, and secure sharing. Make sure to choose a password manager that offers features according to your needs.</p>



<p>Lastly, user interface. The user interface should be user-friendly, making it easy to navigate the dashboard and accessibility to manage passwords.</p>



<p>All these factors are critical while choosing a password manager.  Remember to choose the right one that fits your needs, budget, and preferences.</p>



<div class="wp-block-uagb-advanced-heading uagb-block-f557ae88"><h2 class="uagb-heading-text">Tips on Setting Strong Passwords</h2></div>



<p>We all know that having a strong password is essential for online security. But how do you create a password that&#x2019;s both complex and easy to remember? Here are some tips to help you out!</p>



<p>Avoid repeating passwords at all costs. Reusing passwords for different accounts means that a single breach can compromise all your online profiles.</p>



<p>Also avoid common passwords like &#x201C;password&#x201D; or &#x201C;123456&#x201D;, as these are some of the first guesses that hackers try when attempting to crack passwords.</p>



<p>Use a mix of characters such as uppercase and lowercase letters, numbers and symbols, and make sure your password is at least 12 characters in length. A longer password is harder to guess and crack than a shorter one.</p>



<p>Overall, setting a strong password is crucial to secure your online accounts. Using a password manger can also help generate and store unique passwords for each account, ensuring better protection against potential cyber threats.</p>



<div class="wp-block-uagb-advanced-heading uagb-block-22aab73f"><h2 class="uagb-heading-text">Conclusion</h2></div>



<p>Remembering passwords is hard, especially when you have multiple online accounts. But with a password manager, you can keep all of your passwords in one place.  The encryption process keeps your data safe from prying eyes, and you can access your passwords from multiple devices. </p>



<p>A password manager is a valuable tool for anyone who spends time online. Not only does a password manger save you time, but it also helps keep your online presence more secure.</p>



<p></p>
]]></content:encoded></item><item><title><![CDATA[7 Places where malware can hide]]></title><description><![CDATA[<p>Malware can hide in various places on a computer or network. Here are some common locations where malware may hide:</p>



<ol>
<li>System files: Malware can disguise itself as legitimate system files or inject malicious code into existing files.</li>



<li>Temporary folders: Malware often uses temporary folders to hide and execute its operations,</li></ol>]]></description><link>https://maliciousnews.com/7-places-where-malware-can-hide/</link><guid isPermaLink="false">652c1b2276a01103292d5d6d</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Sat, 03 Jun 2023 20:28:58 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2023/06/laptop-email.png" medium="image"/><content:encoded><![CDATA[
<img src="https://maliciousnews.com/content/images/wordpress/2023/06/laptop-email.png" alt="7 Places where malware can hide"><p>Malware can hide in various places on a computer or network. Here are some common locations where malware may hide:</p>



<ol>
<li>System files: Malware can disguise itself as legitimate system files or inject malicious code into existing files.</li>



<li>Temporary folders: Malware often uses temporary folders to hide and execute its operations, taking advantage of the chaotic nature of these locations.</li>



<li>Registry: Malware may modify the Windows Registry or similar system databases to gain persistence and control over the infected system.</li>



<li>Browser extensions: Malicious browser extensions can be a hiding spot for malware, as they can monitor your browsing activities and inject unwanted advertisements or collect personal information.</li>



<li>Email attachments: Malware can be hidden within email attachments, especially those from unknown or suspicious sources.</li>



<li>Downloads: Illegitimate or compromised software downloads from untrustworthy websites can contain malware, making it important to only download from reputable sources.</li>



<li>External storage devices: Malware can spread through infected USB drives or external hard disks, so it&#x2019;s crucial to be cautious when connecting such devices to your computer.</li>
</ol>



<p>To protect yourself from malware, it&#x2019;s recommended to have up-to-date antivirus software, avoid downloading files from untrusted sources, be cautious with email attachments, and regularly update your operating system and applications.</p>
]]></content:encoded></item><item><title><![CDATA[Trojan Steals Facebook Credentials From Over 300K Android Users]]></title><description><![CDATA[<p>A new Android campaign called Schoolyard Bully has spread to over 300,000 Facebook users. The trojan has been found in applications downloaded from the Google Play store and third-party app stores.</p>



<p>Schoolyard Bully disguises itself as an educational application primarily targeting Vietnamese readers.</p>



<p>Zimperium Researchers <a href="https://www.zimperium.com/blog/schoolyard-bully-trojan-facebook-credential-stealer/?ref=maliciousnews.com" target="_blank" rel="noopener" title="said">said</a> The trojan uses</p>]]></description><link>https://maliciousnews.com/trojan-steals-facebook-credentials-from-over-300k-android-users/</link><guid isPermaLink="false">652c1b2276a01103292d5d69</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Sat, 03 Dec 2022 17:25:02 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2022/12/laptop-email.png" medium="image"/><content:encoded><![CDATA[
<img src="https://maliciousnews.com/content/images/wordpress/2022/12/laptop-email.png" alt="Trojan Steals Facebook Credentials From Over 300K Android Users"><p>A new Android campaign called Schoolyard Bully has spread to over 300,000 Facebook users. The trojan has been found in applications downloaded from the Google Play store and third-party app stores.</p>



<p>Schoolyard Bully disguises itself as an educational application primarily targeting Vietnamese readers.</p>



<p>Zimperium Researchers <a href="https://www.zimperium.com/blog/schoolyard-bully-trojan-facebook-credential-stealer/?ref=maliciousnews.com" target="_blank" rel="noopener" title="said">said</a> The trojan uses Javascript injection to steal Facebook credentials. The Trojan opens the legitimate URL inside a WebView with the malicious javascript injected to extract the user&#x2019;s phone number, email address, and password then sends it to the configured Firebase C&amp;C.</p>



<p>Even though the primary victim group is Vietnamese, Zimperium Research has found over 300,000 victims in over 71 countries. The number of counties could be more than what was accounted for because the applications are still being found in third-party app stores.</p>
]]></content:encoded></item><item><title><![CDATA[3 New Critical Warnings For VMware Workspace One Assist Software]]></title><description><![CDATA[<p>VMware released security updates to fix 3 critical <a href="https://www.vmware.com/security/advisories/VMSA-2022-0028.html?ref=maliciousnews.com" target="_blank" rel="noopener" title="vulnerabilities">vulnerabilities</a> in their One Assist Software. A malicious actor with network access may be able to obtain administrator access without the need to authenticate.</p>



<p>Workspace One Assist is a real-time remote support software.</p>



<p>These flaws are being tracked as CVE-2022-31685 (Authentication Bypass</p>]]></description><link>https://maliciousnews.com/3-new-critical-warnings-for-vmware-workspace-one-assist-software/</link><guid isPermaLink="false">652c1b2276a01103292d5d67</guid><category><![CDATA[Vulnerabilities]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Wed, 09 Nov 2022 04:27:00 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2022/11/laptop-email.jpeg" medium="image"/><content:encoded><![CDATA[
<img src="https://maliciousnews.com/content/images/wordpress/2022/11/laptop-email.jpeg" alt="3 New Critical Warnings For VMware Workspace One Assist Software"><p>VMware released security updates to fix 3 critical <a href="https://www.vmware.com/security/advisories/VMSA-2022-0028.html?ref=maliciousnews.com" target="_blank" rel="noopener" title="vulnerabilities">vulnerabilities</a> in their One Assist Software. A malicious actor with network access may be able to obtain administrator access without the need to authenticate.</p>



<p>Workspace One Assist is a real-time remote support software.</p>



<p>These flaws are being tracked as CVE-2022-31685 (Authentication Bypass Vulnerability), CVE-2022-31686 (Broken Authentication Method vulnerability), and CVE-2022-31687 (Broken Access Control vulnerability).</p>



<p>VMware patched several other vulnerabilities listed below along with the critical flaws above.</p>



<p>Reflected cross-site scripting (XSS) vulnerability (CVE-2022-31688) which due to improper user input sanitization, a malicious actor with some user interaction may be able to inject javascript code in the target user&#x2019;s window. Session fixation vulnerability (CVE-2022-31689) A malicious actor who obtains a valid session token may be able to authenticate to the application using that token.</p>



<p>VMware released a patch to fix these issues with <a href="https://kb.vmware.com/s/article/89993?ref=maliciousnews.com" target="_blank" rel="noopener" title="Workspace One Assist 22.10.">Workspace One Assist 22.10.</a></p>
]]></content:encoded></item><item><title><![CDATA[Patches released for 2 OpenSSL High Vulnerabilities]]></title><description><![CDATA[<p>On Nov 1st OpenSSL project has release patches for a couple of high severity&#xA0;<a href="https://www.openssl.org/news/vulnerabilities.html?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener">flaws</a>&#xA0;that could trigger Denial of Service or trigger remote code execution.</p>



<p>Tracked as&#xA0;<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener">CVE-2022-3786</a>&#xA0;An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of</p>]]></description><link>https://maliciousnews.com/patches-released-for-2-openssl-high-vulnerabilities/</link><guid isPermaLink="false">652c1b2276a01103292d5d66</guid><category><![CDATA[docker]]></category><category><![CDATA[openssl]]></category><category><![CDATA[Vulnerabilities]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Wed, 02 Nov 2022 23:44:17 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2022/11/0649A500-3B3D-4C44-B406-75B5F8058807.jpg" medium="image"/><content:encoded><![CDATA[
<img src="https://maliciousnews.com/content/images/wordpress/2022/11/0649A500-3B3D-4C44-B406-75B5F8058807.jpg" alt="Patches released for 2 OpenSSL High Vulnerabilities"><p>On Nov 1st OpenSSL project has release patches for a couple of high severity&#xA0;<a href="https://www.openssl.org/news/vulnerabilities.html?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener">flaws</a>&#xA0;that could trigger Denial of Service or trigger remote code execution.</p>



<p>Tracked as&#xA0;<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener">CVE-2022-3786</a>&#xA0;An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.&#x2019; character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service).&#xA0;<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener">CVE-2022-3602</a>&#xA0;An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution.</p>



<p>Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6</p>



<p><a href="https://www.docker.com/blog/security-advisory-critical-openssl-vulnerability/?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener">Docker</a>&#xA0;estimates about 1,000 image repositories could be impacted across various Docker Official Images and Docker Verified Publisher images.</p>



<p>Censys has created an interactive&#xA0;<a href="https://datastudio.google.com/u/0/reporting/486e0316-9993-4cbb-90fd-fb0436a947fd/page/p_xoq7nor4zc?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener">dashboard</a>&#xA0;showing (some of the) servers running a version of OpenSSL.</p>



<p></p>
]]></content:encoded></item><item><title><![CDATA[Apple releases IOS and iPadOS patches for an actively exploited zero-day vulnerability.]]></title><description><![CDATA[<p>On Monday Apple released a patch for a zero-day flaw that&#x2019;s been actively exploited. </p>



<p>Tracking as <a href="https://support.apple.com/en-us/HT213489?ref=maliciousnews.com" target="_blank" rel="noopener" title="CVE-2022-42827">CVE-2022-42827</a> described An out-of-bounds write issue was addressed with improved bounds checking. In the out-of-bounds write vulnerability, the software writes data past the end, or before the beginning, of the intended buffer,</p>]]></description><link>https://maliciousnews.com/apple-releases-ios-and-ipados-patches-for-an-actively-exploited-zero-day-vulnerability/</link><guid isPermaLink="false">652c1b2276a01103292d5d65</guid><category><![CDATA[Vulnerabilities]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Wed, 26 Oct 2022 19:14:00 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2022/10/laptop-email.jpeg" medium="image"/><content:encoded><![CDATA[
<img src="https://maliciousnews.com/content/images/wordpress/2022/10/laptop-email.jpeg" alt="Apple releases IOS and iPadOS patches for an actively exploited zero-day vulnerability."><p>On Monday Apple released a patch for a zero-day flaw that&#x2019;s been actively exploited. </p>



<p>Tracking as <a href="https://support.apple.com/en-us/HT213489?ref=maliciousnews.com" target="_blank" rel="noopener" title="CVE-2022-42827">CVE-2022-42827</a> described An out-of-bounds write issue was addressed with improved bounds checking. In the out-of-bounds write vulnerability, the software writes data past the end, or before the beginning, of the intended buffer, which can result in the corruption of data, a crash, or code execution.</p>



<p>Apple didn&#x2019;t go into further details about the flaw other than acknowledging its &#x201C;<em>aware of a report that the issue may have been actively exploited</em>&#x201C;.</p>



<p>Apple also fixed a few other issues with this patch.</p>



<ul><li>CVE-2022-42808 &#x2013; A remote user may be able to cause kernel code execution</li><li>CVE-2022-42829 &#x2013; An app with root privileges may be able to execute arbitrary code with kernel privileges</li><li>CVE-2022-42830 &#x2013; An app with root privileges may be able to execute arbitrary code with kernel privileges</li><li>CVE-2022-42799 &#x2013; Visiting a malicious website may lead to user interface spoofing</li><li>CVE-2022-42823 &#x2013; Processing maliciously crafted web content may lead to arbitrary code execution</li></ul>
]]></content:encoded></item><item><title><![CDATA[Emotet What Does It Do?]]></title><description><![CDATA[<p>Emotet was once described as the &#x201C;<a href="https://www.europol.europa.eu/newsroom/news/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener">world&#x2019;s most dangerous malware</a>&#x201C;, by Europol. Security researchers first discovered the <a href="https://maliciousnews.com/2022/10/malware-what-is-it-and-how-to-stay-protected/" target="_blank" rel="noopener" title="malware">malware</a> as a banking trojan in 2014.</p>



<h2 class="kt-adv-heading_fa50b9-39 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_fa50b9-39">What is Emotet?</h2>



<p>Emotet is a Trojan that is spread through email, that could contain a malicious attachment or a malicious link.</p>]]></description><link>https://maliciousnews.com/emotet-what-does-it-do/</link><guid isPermaLink="false">652c1b2276a01103292d5d63</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Sat, 22 Oct 2022 23:36:54 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2022/10/laptop-email-1.jpg" medium="image"/><content:encoded><![CDATA[
<img src="https://maliciousnews.com/content/images/wordpress/2022/10/laptop-email-1.jpg" alt="Emotet What Does It Do?"><p>Emotet was once described as the &#x201C;<a href="https://www.europol.europa.eu/newsroom/news/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener">world&#x2019;s most dangerous malware</a>&#x201C;, by Europol. Security researchers first discovered the <a href="https://maliciousnews.com/2022/10/malware-what-is-it-and-how-to-stay-protected/" target="_blank" rel="noopener" title="malware">malware</a> as a banking trojan in 2014.</p>



<h2 class="kt-adv-heading_fa50b9-39 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_fa50b9-39">What is Emotet?</h2>



<p>Emotet is a Trojan that is spread through email, that could contain a malicious attachment or a malicious link. Emotet utilizes social engineering tricks by using branding to disguise themselves to look legitimate by using tempting keywords &#x201C;Payment Details&#x201D;, and &#x201C;Shipping Information&#x201D; and luring the victim into downloading the malicious Office file and enabling macros.</p>



<p>Emotet uses C&amp;C servers to receive updated versions of the virus as well as to dump stolen personal information. </p>



<h2 class="kt-adv-heading_2f516f-a7 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_2f516f-a7">How Does Emotet Spread?</h2>



<p>Malspam is the main way that Emotet is distributed. Your friends, family, coworkers, and clients receive messages from Emotet after it has combed through your contacts list. Since the emails appear less spammy because they are originating from your compromised email account, recipients are more likely to click risky links and download malicious files because they feel safer. </p>



<p>Emotet can spread to other connected computers and nearby Wi-Fi networks using its worm-like ability to capture admin passwords. Emotet is an example of polymorphic malware since it may constantly alter its identifiable properties to avoid detection. It can adjust properly, for instance by going dormant to avoid discovery, if it finds itself operating in a virtual machine (VM) or sandbox environment.</p>



<p>Emotet frequently installs TrickBot, a different banking Trojan that targets Windows-based computers. To take advantage of the Windows EternalBlue vulnerability, TrickBot uses the Mimikatz program.</p>



<h2 class="kt-adv-heading_b58f31-34 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_b58f31-34">How Can I Protect Myself?</h2>



<p>The first step is to educate yourself on what it is and how it works, so you are already ahead of the game.</p>



<ul><li>Make sure all your devices are up to date on the latest patches. In order to prevent hackers from exploiting the Windows EternalBlue vulnerability, which TrickBot frequently uses as a secondary Emotet payload, patch Windows as soon as possible.</li><li>Don&#x2019;t click on suspicious links</li><li>Use stronger passwords and use two-factor authentication</li><li>You can protect yourself by using <a href="https://www.malwarebytes.com/?ref=maliciousnews.com" target="_blank" rel="noopener" title="Malwarebytes">Malwarebytes</a> as an added layer of protection for home users, and for business owners, you can also use their business products.</li></ul>
]]></content:encoded></item><item><title><![CDATA[Zimbra Exploit Added to CISA KVE]]></title><description><![CDATA[<p><a href="https://www.cisa.gov/cybersecurity?ref=maliciousnews.com" target="_blank" rel="noopener" title="CISA">CISA</a> on Thursday, Oct 20 added the Zimbra Collaboration exploit to the Known Vulnerabilities Exploit catalog (<strong><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?ref=maliciousnews.com" target="_blank" rel="noopener" title="KVE">KVE</a></strong>).</p>



<p>The issue is tracked as <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41352?ref=maliciousnews.com" target="_blank" rel="noopener" title="CVE-2022-41352">CVE-2022-41352</a>, this is a remote code execution vulnerability that has to do with cpio a third-party utility tool used to extract archive attachments from an email. Which allows</p>]]></description><link>https://maliciousnews.com/zimbra-exploit-added-to-cisa-kve/</link><guid isPermaLink="false">652c1b2276a01103292d5d62</guid><category><![CDATA[Zimbra]]></category><category><![CDATA[Vulnerabilities]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Thu, 20 Oct 2022 09:53:00 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2022/10/email-purple.jpg" medium="image"/><content:encoded><![CDATA[
<img src="https://maliciousnews.com/content/images/wordpress/2022/10/email-purple.jpg" alt="Zimbra Exploit Added to CISA KVE"><p><a href="https://www.cisa.gov/cybersecurity?ref=maliciousnews.com" target="_blank" rel="noopener" title="CISA">CISA</a> on Thursday, Oct 20 added the Zimbra Collaboration exploit to the Known Vulnerabilities Exploit catalog (<strong><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?ref=maliciousnews.com" target="_blank" rel="noopener" title="KVE">KVE</a></strong>).</p>



<p>The issue is tracked as <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41352?ref=maliciousnews.com" target="_blank" rel="noopener" title="CVE-2022-41352">CVE-2022-41352</a>, this is a remote code execution vulnerability that has to do with cpio a third-party utility tool used to extract archive attachments from an email. Which allows a threat actor to carry out the execution of arbitrary code on a vulnerable zimbra instance without authorization. This can be exploited by an attacker sending malicious email attachments to a vulnerable server. </p>



<p>Once inside, for example, an attacker may be able to extract emails, tamper with user accounts, and wipe information.</p>



<p>The latest ZCS version 9.0.0 P27 replaces the vulnerable component, cpio, with pax, which performs a similar function.</p>
]]></content:encoded></item><item><title><![CDATA[5 Most Dangerous Malware Threats]]></title><description><![CDATA[<!--kg-card-begin: html-->
<p><a href="https://maliciousnews.com/2022/10/malware-what-is-it-and-how-to-stay-protected/" target="_blank" rel="noopener" title="Malware">Malware</a> is constantly changing and becoming more advanced and harmful.<br>Cybercriminals will do whatever it takes to access a computer system and handle sensitive data.</p>



<h2 class="kt-adv-heading_3e31b7-5c wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_3e31b7-5c">1. Clop Ransomware</h2>



<p>One of the deadliest computer risks is clop ransomware, which may start or stop processes in a Windows domain in order to</p>]]></description><link>https://maliciousnews.com/5-most-dangerous-malware-threats/</link><guid isPermaLink="false">652c1b2276a01103292d5d61</guid><category><![CDATA[malware]]></category><category><![CDATA[raas]]></category><category><![CDATA[ransomware]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Tue, 18 Oct 2022 08:55:00 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2022/10/Malware-threats-2.png" medium="image"/><content:encoded><![CDATA[<!--kg-card-begin: html-->
<img src="https://maliciousnews.com/content/images/wordpress/2022/10/Malware-threats-2.png" alt="5 Most Dangerous Malware Threats"><p><a href="https://maliciousnews.com/2022/10/malware-what-is-it-and-how-to-stay-protected/" target="_blank" rel="noopener" title="Malware">Malware</a> is constantly changing and becoming more advanced and harmful.<br>Cybercriminals will do whatever it takes to access a computer system and handle sensitive data.</p>



<h2 class="kt-adv-heading_3e31b7-5c wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_3e31b7-5c">1. Clop Ransomware</h2>



<p>One of the deadliest computer risks is clop ransomware, which may start or stop processes in a Windows domain in order to hide from common antivirus software and computer users. Clop ransomware creates entries in the Windows Registry in order to achieve persistence.</p>



<p>The majority of operating system versions, including Windows XP, Windows 7, Windows 8, Windows 8.1, and Windows 10, can be infected by the Clop ransomware virus, making it one of the most hazardous types of malware.</p>



<h2 class="kt-adv-heading_7ecd76-2c wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_7ecd76-2c">2. Shlayer Malware</h2>



<p>This form of malware targets macOS devices, Its sole function is to use bogus programs and flash updates to download harmful code. Once the Shlayer virus has been installed on a machine, it starts downloading and installing adware, or software designed to increase the number of advertisements. This was initially introduced by hackers using a unique zero-day vulnerability to launch the attack.</p>



<h2 class="kt-adv-heading_3441d9-90 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_3441d9-90">3. IoT Device Attacks</h2>



<p>Threat actors tend to target these devices because of the lack of security. Typical IoT device does not have a built-in security solution to counter cyber threats. IoT devices commonly contain easy-to-access data, ranging from passwords to user names. Hackers leverage this data to break into accounts and steal more information.</p>



<h2 class="kt-adv-heading_b3c482-d6 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_b3c482-d6">4. RaaS</h2>



<p>Ransomware as a Service (RaaS) is a business model that allows malware developers to lease ransomware tools. A user also known as an affiliate pays per month a subscription cost regardless of the cost affiliates earn a percentage of each successful ransom collected and then the money is divided between the developer and the affiliate.</p>



<h2 class="kt-adv-heading_2b7593-ff wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_2b7593-ff">5. Zeus Gameover</h2>



<p>Zeus Gameover is a variant of the Zeus malware family. The main goal is to steal money from its victims by utilizing a sizable botnet to either automatically transfer money from the victim&#x2019;s online bank account to the attacker&#x2019;s bank account or steal bank account information. This is all done by taking over the victim&#x2019;s banking session and these fraudulent methods are performed in real-time.</p>
<!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Fortinet Authentication Bypass Exploit POC Released]]></title><description><![CDATA[<p><a href="https://www.horizon3.ai/fortios-fortiproxy-and-fortiswitchmanager-authentication-bypass-technical-deep-dive-cve-2022-40684/?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener"><strong>Horizon3.ai</strong></a>&#xA0;recently released a proof of concept on the Fortinet Authentication Bypass vulnerability.<strong>&#xA0;<a href="https://github.com/horizon3ai/CVE-2022-40684?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener">Horizon3.ai</a></strong>&#xA0;researchers created an exploit after examining the differences between the vulnerable firmware and the patched version.</p>



<p>Soon after releasing the proof of concept, exploit attempts numbers started to&#xA0;<a href="https://viz.greynoise.io/tag/fortios-authentication-bypass-attempt?days=3&amp;ref=maliciousnews.com" target="_blank" rel="noreferrer noopener"><strong>rise</strong></a>.</p>



<p>On</p>]]></description><link>https://maliciousnews.com/fortinet-authentication-bypass-exploit-poc-released/</link><guid isPermaLink="false">652c1b2276a01103292d5d60</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Fortinet]]></category><category><![CDATA[Vulnerabilities]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Fri, 14 Oct 2022 03:52:00 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2022/10/directory-list-scaled-e1665817691785.jpg" medium="image"/><content:encoded><![CDATA[
<img src="https://maliciousnews.com/content/images/wordpress/2022/10/directory-list-scaled-e1665817691785.jpg" alt="Fortinet Authentication Bypass Exploit POC Released"><p><a href="https://www.horizon3.ai/fortios-fortiproxy-and-fortiswitchmanager-authentication-bypass-technical-deep-dive-cve-2022-40684/?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener"><strong>Horizon3.ai</strong></a>&#xA0;recently released a proof of concept on the Fortinet Authentication Bypass vulnerability.<strong>&#xA0;<a href="https://github.com/horizon3ai/CVE-2022-40684?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener">Horizon3.ai</a></strong>&#xA0;researchers created an exploit after examining the differences between the vulnerable firmware and the patched version.</p>



<p>Soon after releasing the proof of concept, exploit attempts numbers started to&#xA0;<a href="https://viz.greynoise.io/tag/fortios-authentication-bypass-attempt?days=3&amp;ref=maliciousnews.com" target="_blank" rel="noreferrer noopener"><strong>rise</strong></a>.</p>



<p>On Thursday Wordfence Threat analyst Ram Gall&#xA0;<a href="https://www.wordfence.com/blog/2022/10/threat-advisory-cve-2022-40684-fortinet-appliance-auth-bypass/?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener"><strong>published&#xA0;</strong></a>a Threat Advisory<br>stating their team was tracking exploit attempts targeting CVE-2022-40684 on their network. At the time of publishing, they recorded several attempts and requests from over 20 IP addresses.</p>



<p>Most of the requests they observed trying to find whether a Fortinet appliance was in place.</p>



<p>But they did find a number of those IPs are also sending out PUT requests matching the recently released POC, which attempts to update the public SSH key of the admin user.</p>
]]></content:encoded></item><item><title><![CDATA[Fortinet Critical Authentication Bypass Vulnerability has been exploited.]]></title><description><![CDATA[<p>Fortinet on Monday published an&#xA0;<a href="https://www.fortiguard.com/psirt/FG-IR-22-377?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener"><strong>advisory&#xA0;</strong></a>confirming that this vulnerability has been exploited in the wild.</p>



<p class="kt-adv-heading_c54bf7-f8 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_c54bf7-f8">&#x201C;Fortinet is aware of an instance where the vulnerability was exploited and recommended immediately validating your system against the following indicator of compromise in the device logs&#x201D;.</p>



<p class="kt-adv-heading_3f7840-27 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_3f7840-27">Earlier this month</p>]]></description><link>https://maliciousnews.com/fortinet-critical-authentication-bypass-vulnerability-has-been-exploited/</link><guid isPermaLink="false">652c1b2276a01103292d5d5e</guid><category><![CDATA[Authentication]]></category><category><![CDATA[Fortinet]]></category><category><![CDATA[Vulnerabilities]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Wed, 12 Oct 2022 08:15:00 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2022/10/security-alert-1.jpg" medium="image"/><content:encoded><![CDATA[
<img src="https://maliciousnews.com/content/images/wordpress/2022/10/security-alert-1.jpg" alt="Fortinet Critical Authentication Bypass Vulnerability has been exploited."><p>Fortinet on Monday published an&#xA0;<a href="https://www.fortiguard.com/psirt/FG-IR-22-377?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener"><strong>advisory&#xA0;</strong></a>confirming that this vulnerability has been exploited in the wild.</p>



<p class="kt-adv-heading_c54bf7-f8 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_c54bf7-f8">&#x201C;Fortinet is aware of an instance where the vulnerability was exploited and recommended immediately validating your system against the following indicator of compromise in the device logs&#x201D;.</p>



<p class="kt-adv-heading_3f7840-27 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_3f7840-27">Earlier this month reports began circulating that Fortinet communicated directly with customers about a critical vulnerability in its&#xA0;<a href="https://www.fortinet.com/products/fortigate/fortios?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener"><strong>FortiOS&#xA0;</strong></a>and&#xA0;<a href="https://www.fortinet.com/products/secure-web-gateway/fortiproxy?ref=maliciousnews.com" target="_blank" rel="noreferrer noopener"><strong>FortiProxy&#xA0;</strong></a>products.</p>



<p class="kt-adv-heading_af76d6-be wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_af76d6-be">This vulnerability CVE-2022-40684 with a (CVSS score 9.6) deals with an authentication bypass using an alternate path or channel in FortiOS, FortiProxy and FortiSwitchManager may allow an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.</p>



<h2 class="kt-adv-heading_36183f-5d wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_36183f-5d">Affected Products</h2>



<p>FortiOS version 7.2.0 &#x2013; 7.2.1<br>FortiOS version 7.0.0 &#x2013; 7.2.1<br>FortiProxy version 7.20<br>FortiProxy version 7.0.0 &#x2013; 7.0.6<br>FortiSwitchManager version 7.2.0<br>FortiSwitchManager version 7.0.0</p>



<h2 class="kt-adv-heading_8c9475-80 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_8c9475-80">Updates</h2>



<p>Please upgrade to FortiOS version 7.2.2 or above<br>Please upgrade to FortiOS version 7.0.7 or above<br>Please upgrade to FortiProxy version 7.2.1 or above<br>Please upgrade to FortiProxy version 7.0.7 or above<br>Please upgrade to FortiSwitchManager version 7.2.1 or above</p>
]]></content:encoded></item><item><title><![CDATA[Critical RCE Vulnerability Found in vm2 Sandbox Module]]></title><description><![CDATA[<p class="kt-adv-heading_89c8a2-c8 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_89c8a2-c8">An extremely popular sandbox library with more than 16 million downloads a month, vm2 can run untrusted code securely in a single process with your code side by side.</p>



<p class="kt-adv-heading_30906e-2d wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_30906e-2d">Researchers from Oxeye discovered the vulnerability codenamed &#x201C;Sandbreak&#x201D;, a critical remote code execution vulnerability. A threat actor who exploits</p>]]></description><link>https://maliciousnews.com/critical-rce-vulnerability-found-in-vm2-sandbox-module/</link><guid isPermaLink="false">652c1b2276a01103292d5d5d</guid><category><![CDATA[Vulnerabilities]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Wed, 12 Oct 2022 03:32:09 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2022/10/vm2.png" medium="image"/><content:encoded><![CDATA[
<img src="https://maliciousnews.com/content/images/wordpress/2022/10/vm2.png" alt="Critical RCE Vulnerability Found in vm2 Sandbox Module"><p class="kt-adv-heading_89c8a2-c8 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_89c8a2-c8">An extremely popular sandbox library with more than 16 million downloads a month, vm2 can run untrusted code securely in a single process with your code side by side.</p>



<p class="kt-adv-heading_30906e-2d wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_30906e-2d">Researchers from Oxeye discovered the vulnerability codenamed &#x201C;Sandbreak&#x201D;, a critical remote code execution vulnerability. A threat actor who exploits the vulnerability will be able to bypass the environment and run shell commands on the hosting machine of the sandbox.</p>



<p class="kt-adv-heading_d3c4da-36 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_d3c4da-36">This vulnerability has been given a maximum CVSS score of 10 and Github has issued an&#xA0;<strong><a href="https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq?ref=maliciousnews.com" target="_blank" rel="noopener" title="advisory">advisory</a></strong>&#xA0;CVE-2022-36067.</p>


]]></content:encoded></item><item><title><![CDATA[Malware what is it, and how to stay protected?]]></title><description><![CDATA[<h2 class="kt-adv-heading_ca80f0-a3 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_ca80f0-a3">What is Malware?</h2>



<p class="kt-adv-heading_f1f935-ca wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_f1f935-ca">Malware (short for &#x201C;malicious software&#x201D;) is any program designed for malicious intent and used to exploit vulnerabilities, damage, or gain unauthorized access to a system or a computer network. Malware can delete your files, steal your personal information and lock you out of your system.</p>]]></description><link>https://maliciousnews.com/malware-what-is-it-and-how-to-stay-protected/</link><guid isPermaLink="false">652c1b2276a01103292d5d5b</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[Malicious News]]></dc:creator><pubDate>Tue, 11 Oct 2022 06:17:49 GMT</pubDate><media:content url="https://maliciousnews.com/content/images/wordpress/2022/10/01-01-2.png" medium="image"/><content:encoded><![CDATA[
<h2 class="kt-adv-heading_ca80f0-a3 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_ca80f0-a3">What is Malware?</h2>



<img src="https://maliciousnews.com/content/images/wordpress/2022/10/01-01-2.png" alt="Malware what is it, and how to stay protected?"><p class="kt-adv-heading_f1f935-ca wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_f1f935-ca">Malware (short for &#x201C;malicious software&#x201D;) is any program designed for malicious intent and used to exploit vulnerabilities, damage, or gain unauthorized access to a system or a computer network. Malware can delete your files, steal your personal information and lock you out of your system.</p>



<h2 class="kt-adv-heading_ab4c10-4e wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_ab4c10-4e">Types of Malware</h2>



<p class="kt-adv-heading_415683-13 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_415683-13"><strong>Virus &#x2013;</strong> a software program that attaches itself to a program. Which can then replicate and spread after a person runs the program on their system. Viruses can slow down your system resources, destroy data and capture keystrokes.</p>



<p class="kt-adv-heading_37925b-0a wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_37925b-0a"><strong>Worms &#x2013;</strong> a standalone malware computer program that can duplicate itself in order to spread to other computers. It travels across network connections to spread itself. The difference between a virus and a worm, a worm can execute independently on its own versus a virus that needs a host application.</p>



<p class="kt-adv-heading_2991bf-ed wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_2991bf-ed"><strong>Trojan Horse &#x2013;</strong> a software program that disguises itself as regular programs, e.g. games, antivirus programs, and disk utilities. When these programs run the malicious users are able to do any activities such as exporting files, modifying data, and deleting files to the system.</p>



<p class="kt-adv-heading_8e7ec1-d0 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_8e7ec1-d0"><strong>Spyware &#x2013;</strong> a type of software that is installed on a user&#x2019;s system without their knowledge or permission. It monitors the user&#x2019;s browsing activity and steals sensitive information like banking information and passwords.</p>



<p class="kt-adv-heading_bfc126-60 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_bfc126-60"><strong>Spam &#x2013;</strong> is digital junk mail and unsolicited communications sent in bulk through an electronic messaging system. Spam is a security concern because it can contain links in emails to phishing websites or other sites hosting malware.</p>



<p class="kt-adv-heading_2fa0ad-69 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_2fa0ad-69"><strong>Phishing &#x2013;</strong> a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information.</p>



<p class="kt-adv-heading_df5f77-57 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_df5f77-57"><strong>Email Spoofing &#x2013;</strong> is the creation of email messages with a forged sender address to manipulate the recipient that it originated from a trusted source. Scammers use this method of deception because they know the person will more likely engage with the email content.</p>



<p class="kt-adv-heading_a40139-3e wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_a40139-3e"><strong>Ransomware &#x2013;</strong> is a malware designed to deny a user or company access to their files using encryption. The attacker will demand a ransom payment in exchange for the private key to use to decrypt the files.</p>



<h2 class="kt-adv-heading_a43ba3-8d wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_a43ba3-8d">Signs of Malware on your system</h2>



<ul><li>Computer performance slows down</li><li>System crashes</li><li>Random popup ads</li><li>Default browser changes</li></ul>



<h2 class="kt-adv-heading_b6960a-b1 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_b6960a-b1">How do I get Malware?</h2>



<p class="kt-adv-heading_8a5906-81 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_8a5906-81">The most common ways to get malware on your system are through the internet and email. Anytime you visit a website that&#x2019;s been hacked, download infected files, install an app from an unfamiliar source or open a malicious email attachment.</p>



<h2 class="kt-adv-heading_ef162b-0d wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_ef162b-0d">How to remove Malware</h2>



<h3 class="kt-adv-heading_4c9e31-07 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_4c9e31-07">Step 1. Disconnect from the internet</h3>



<p class="kt-adv-heading_2aa966-84 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_2aa966-84">Discount your system from the internet, this keeps your system from sending information back to the malware server.</p>



<h3 class="kt-adv-heading_983ee8-a9 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_983ee8-a9">Step 2. Enter Safe Mode</h3>



<p class="kt-adv-heading_07b11c-6c wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_07b11c-6c">Safe mode allows only minimal programs to startup, in the event you have malware on your system, this mode will help make it easier to remove it.</p>



<h3 class="kt-adv-heading_6589b8-90 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_6589b8-90">Step 3. Check your activity monitor</h3>



<p class="kt-adv-heading_83e649-81 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_83e649-81">Go through the activity monitor and locate the malicious software, select it, and quit the program.</p>



<h3 class="kt-adv-heading_cb2743-c8 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_cb2743-c8">Step 4. Run a malware scanner</h3>



<p class="kt-adv-heading_1984c2-30 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_1984c2-30">At this stage, you&#x2019;re ready to fix your system. Running a malware scanner is usually enough to get rid of most infections. If you already had an antivirus installed on your computer, you should download a different malware scanner than what you&#x2019;re using. I recommend <a href="https://www.malwarebytes.com/mwb-download?ref=maliciousnews.com" target="_blank" rel="noopener" title="Malwarebytes">Malwarebytes</a>, the free version is sufficient enough to use.</p>



<h3 class="kt-adv-heading_e5a74e-a9 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_e5a74e-a9">Step 5. Fix your browser</h3>



<p class="kt-adv-heading_b9f9f8-5c wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_b9f9f8-5c">Check your browser&#x2019;s homepage address to make sure it&#x2019;s correct, malware will modify your homepage so that it can reinfect your system. Once you&#x2019;ve verified your homepage settings check your extensions for any malicious extensions that may have been added.</p>



<h2 class="kt-adv-heading_dcc436-71 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_dcc436-71">Summary</h2>



<p class="kt-adv-heading_41bab4-70 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_41bab4-70">Now with this information on malware, we hope this sheds light on the dangers of malware and the importance of staying vigilant on security practices. Remember to update your systems regularly.</p>
]]></content:encoded></item></channel></rss>