CISA adds Looney Tunables Linux bug to its Known Exploited Vulnerabilities catalog

US CISA adds Looney Tunables Linux flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Looney Tunables Linux vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability CVE-2023-4911 (CVSS score 7.8), aka Looney Tunables, is a buffer overflow issue that resides in the GNU C Library’s dynamic loader ld.so while processing the […]

November 22, 2023
Read More >>

Hack The Box: Broker Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Broker Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Broker machine? For the user flag, you will need to directly into the non-competitive queue to emphasize a significant vulnerability currently prevalent. ActiveMQ, a […]

The post Hack The Box: Broker Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

November 14, 2023
Read More >>

Hack The Box: Download Machine – Hard Difficulty

In this post, I would like to share a walkthrough of the Download Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the Download machine? For the user flag, you will need to abuse the file read vulnerability which allows us to read the site’s source code. […]

The post Hack The Box: Download Machine – Hard Difficulty appeared first on Threatninja.net.

November 11, 2023
Read More >>

Looney Tunables bug exploited for cryptojacking

Kinsing threat actors have been spotted exploiting the recently disclosed Looney Tunables (CVE-2023-4911) vulnerability to covertly install cryptomining software into cloud-native environments. Kinsing (aka Money Libra) is a threat actor group that has…

November 7, 2023
Read More >>

Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments

Linux Privilege Escalation flaw is one of the highly critical flaws as it can allow an attacker to gain elevated privileges on a system, potentially leading to full control.  Hackers typically exploit these vulnerabilities by crafting malicious code or commands that take advantage of the flaw, then execute them on a target system to gain […]

The post Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

November 6, 2023
Read More >>