Cybersecurity ???And Much More Newsletter ?? Vol. 3 Num. 16
Greetings, friends. ??
???Welcome to my newsletter, if you are not yet subscribed, please do ??. It might include books??, articles ??, tech ??, tips??, and cool stuff about cybersecurity ??.
Enjoy!
What’s Happening
???CISA Added Four New Vulnerabilities to KEV Catalog
CISA has recently identified four new vulnerabilities in its Known Exploited Vulnerability (KEV) catalog: a privilege elevation issue in Android Framework, an insecure deserialization vulnerability in Novi Survey, a type confusion vulnerability in the Google Chromium V8 Engine, and a use-after-free vulnerability in macOS. The mitigation deadlines for these vulnerabilities are in early May, and FCEB agencies should take prompt action to address them.
???No Extraterrestrial APT yet, but Space Systems are Critical Infrastructure
According to a recent report from CSC 2.0, which is the successor to the Cyberspace Solarium Commission, the national security implications of the space race now include not just weapons systems, but also the security of critical infrastructure. This infrastructure relies heavily on global positioning satellites, remote imagery, and advanced communication. CSC 2.0 recommends that space systems be considered critical infrastructure to reflect their importance.
???Kubernetes RBAC Exploited for Crypto Mining
A recent attack campaign discovered in the wild has been effectively exploiting the security weaknesses in Kubernetes (K8s) Role-Based Access Control (RBAC) to create backdoors and run cryptocurrency miners.
According to a report by cloud security firm Aqua, the attackers carried out their plan by deploying DaemonSets to take over and hijack resources of the K8s clusters they attacked. The security company, which named the attack RBAC Buster, identified 60 exposed K8s clusters that were exploited by the threat actor behind this campaign.
The attack started with the attacker gaining initial access via a misconfigured API server, then checking for signs of competing miner malware on the compromised server, and finally using RBAC to establish persistence.
???US Dept. of Health and Human Services Publishes Cybersecurity Resources
The US Department of Health and Human Services (HHS) 405(d) Program and the Health Sector Coordinating Council Cybersecurity Working Group (HSCC CWG) have recently released several valuable resources to assist healthcare organizations in addressing cybersecurity concerns. These resources include the 2023 edition of the Health Industry Cybersecurity Practices (HICP), Knowledge on Demand, an online educational platform that offers free healthcare-focused cybersecurity awareness training, and a comprehensive report on the Hospital Cyber Resiliency Initiative Landscape Analysis. With these resources, healthcare organizations can confidently take steps to enhance their cybersecurity posture and protect their valuable information assets.
???Cisco and VMware Patching some Critical Vulnerabilities
Cisco and VMware have taken swift action to address critical security flaws in their products, which could have potentially been exploited by malicious actors to execute arbitrary code on affected systems.
The most severe vulnerability, a command injection flaw in Cisco Industrial Network Director (CVE-2023-20036, CVSS score: 9.9), has been resolved. The vulnerability was found to reside in the web UI component and arose as a result of improper input validation when uploading a Device Pack.
"A successful exploit could allow the attacker to execute arbitrary commands as NT AUTHORITY\SYSTEM on the underlying operating system of an affected device," Cisco said in an advisory released on April 19, 2023.
Furthermore, Cisco has resolved a medium-severity file permissions vulnerability in the same product (CVE-2023-20039, CVSS score: 5.5) that an authenticated, local attacker, could exploit to view sensitive information.
???? ♂??Microsoft Contributing to the Shutdown of Israeli Spyware Company
QuaDream, an Israeli spyware company, is shutting down operations after Citizen Lab and Microsoft released reports detailing the company’s tools and victims. The company's spyware “framework” was allegedly used to target dissidents, NGO workers, and journalists in North America, Asia, Europe, and the Middle East. The swift shutdown of QuaDream's operations suggests that the company recognizes the gravity of the situation and the strength of the evidence against it.
???Google Releases Emergency Fix for Chrome Zero-day
领英推荐
Google has proactively released a critical update for its Chrome desktop browser to address a vulnerability that is currently being exploited. The vulnerability is related to a type confusion in the Chrome V8 JavaScript engine, which may provide a potential avenue for a remote attacker to exploit heap corruption via a crafted HTML page.
Security Tips
???????Telco Security - Let’s Discover the 5G Security Architecture (Part-01)
Before we deep dive into the 5G security features, it is important to understand the high level security architecture. The 5G Security Architecture comprises six domains, each of which serves as a set of security features. These domains can be summarized as follows:
Note: 5G Service-Based Architecture (SBA) is built on web technology and web protocols to enable flexible and scalable deployments using virtualization and container technologies and cloud-based processing platforms. To protect the SBA, 3GPP TS 33.501 introduces a new security domain for 5G SBA domain security composed of a set of security features that include: Network function registration, discovery, and authorization security aspects; Authentication (TLS 1.2 or 1.3), authorization (OAuth 2.0), and encryption (TLS 1.2 or 1.3) of API calls between the 5G NFs. Read more.
????? The Problem of Bias in Cybersecurity
Bias is a major issue in the cybersecurity business. Cybersecurity professionals' approaches to security are frequently prejudiced, which can result in inefficient security measures and a failure to protect against specific sorts of threats.
To address these biases, the cybersecurity sector must adopt a more comprehensive approach to security that takes into account all types of threats and vulnerabilities. It must also acknowledge the value of workplace diversity and inclusivity, and endeavor to establish a more equal and supportive environment for all cybersecurity workers.
My Favorites
???Books I Recommend Reading ??
Read ???- 04 Books for the Stoics
Read ???- 05 Python Books for Hackers
Podcast ???- Post-Quantum TLS With KEMs Instead of Signatures!
TLS 1.3 has been widely praised as a major upgrade to the Transport Layer Security protocol responsible for securing the majority of Web traffic. But one area in which TLS 1.3 seems to be lacking is its potential for resistance to attacks that utilize quantum computing – computers that, theoretically, could factor the products of large primes and solve the discrete logarithm problem in relatively short periods of time, significantly affecting the security of TLS 1.3.
Watch ?? - Some Hacker-Like Movies for the Weekend
Quote of the Week
"The greatest glory in living lies not in never falling, but in rising every time we fall." - Nelson Mandela
If you’re interested in starting a career in cybersecurity, watch this one , and don’t forget to ???***Subscribe to my Youtube Channel *** and leave a comment if there are any topics you’re interested in seeing in my next video.
Check out my other stuff here .
??????Apparently, most of you are not interested in subscribing to my youtube channel , so please let me know why and I will make it valuable to you, I promise ??.