Security: Patches, Flaws, and FUD
-
Security updates for Tuesday [LWN.net]
Security updates have been issued by Oracle (kernel and kernel-container), SUSE (bluez, gimp, rubygem-rails-html-sanitizer, systemd-presets-common-SUSE, and u-boot), and Ubuntu (libxslt).
-
7 open-source malware analysis tools you should try out
There are two main types of malware analysis: static and dynamic.
Performing static analysis of a malicious binary means concentrating on analyizing its code without executing it. This type of analysis may reveal to malware analysts not only what the malware does, but also its developer’s future intentions (e.g., currently unfinished functionalities).
-
CISA releases 7 Industrial Control Systems Advisories | CISA
CISA has released 7 Industrial Control Systems (ICS) advisories on August 23, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
-
Measuresoft ScadaPro Server and Client [Ed: Microsoft TCO (ActiveX)]
ScadaPro Server uses unmaintained ActiveX controls. These controls may allow two stack-based buffer overflow instances while processing a specific project file.
-
Measuresoft ScadaPro Server [Ed: Microsoft TCO (ActiveX) again]
The affected product uses an unmaintained ActiveX control, which may allow an out-of-bounds write condition while processing a specific project file.
-
'DirtyCred' Vulnerability Haunting Linux Kernel for 8 Years [Ed: It's not a very severe issue; only existing tenants of the same machine can exploit this]
Academic researchers from Northwestern University have shared details on ‘DirtyCred’, a previously unknown privilege escalation vulnerability affecting the Linux kernel.
-
CERT-In issues threat alert for high severity vulnerabilities in Linux, Unix and Realtek SDK [Ed: This is an issue in unrar, which few Linux machines even have installed; it's not a "Linux" issue]
The path traversal vulnerability in Linux and Unix reportedly exists in the RarLab’s UnRAR utility tool. It can be exploited by attackers to execute arbitrary codes on the targeted systems.
-
Preparing Your Incident Response Team for Container Incidents
The use of containers—and orchestration platforms like Kubernetes—is increasing rapidly around the globe. Analysts predict that by 2023, more than 70% of global organizations will be running more than two containerized applications in production, up from less than 20% in 2019. The downside of this rapid growth is that many organizations have fallen behind when it comes to securing all of this new technology. This is especially true when it comes to responding to any incidents which may occur in containers.
This article will give you five practical steps to ensure that, when a security incident involving a container happens, your incident response team will be prepared. It is very easy to think that existing policies, methods and tools will cover containers, but they are actually very different and must be accounted for during an incident response effort.
-
VMware Releases Security Update
VMware has released a security update to address a vulnerability in Tools. A remote attacker could likely exploit the vulnerability to take control of an affected system.