article thumbnail

3CX voice and video conferencing software victim of a supply chain attack

Security Affairs

Popular voice and video conferencing software 3CX was the victim of a supply chain attack, SentinelOne researchers reported. As of Mar 22, 2023, SentinelOne observed a spike in behavioral detections of the 3CXDesktopApp, which is a popular voice and video conferencing software product. ” explained 3CX’s CEO Nick Galea.

article thumbnail

Unpatched Python Library Affects More Than 300,000 Open Source Projects

eSecurity Planet

Trellix security researchers have revealed a major vulnerability in the Python tarfile library that could be exploited in software supply chain attacks. Researchers made a video where they gain administrative privileges with the flaw by abusing Spyder IDE, a free and popular open-source environment made in Python.

Libraries 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers created a PoC for Apache OFBiz flaw CVE-2023-51467

Security Affairs

Researchers from cybersecurity firm VulnCheck have created a proof-of-concept (PoC) exploit code for the recently disclosed critical flaw CVE-2023-51467 (CVSS score: 9.8) As a result, like with many supply chain libraries, the impact of this vulnerability could be severe if leveraged by threat actors.” in the Apache OfBiz.

Honeypots 131
article thumbnail

Vulnerability Recap 4/1/24: Cisco, Fortinet & Windows Server Updates

eSecurity Planet

The US Cybersecurity & Infrastructure Security Agency (CISA) added this exploit to their vulnerability catalog indicating active exploitation in the wild. or above March 25, 2024 Hackers Pollute Python Package Index Open-Source Libraries Type of vulnerability (or attack): Malicious library code. Upgrade versions 7.2.0

Libraries 108
article thumbnail

News alert: Security Journey accelerates secure coding training platform enhancements

The Last Watchdog

With calls for ‘ secure by design ’ coming from the very top of the Cybersecurity and Infrastructure Security Agency (CISA), establishing and continuously boosting secure coding knowledge gain amongst software development professionals is essential. undergraduate computer science programs mandate courses in application security.

Security 189
article thumbnail

Stop Ransomware in its Tracks With CipherTrust Transparent Encryption Ransomware Protection

Thales Cloud Protection & Licensing

Stop Ransomware in its Tracks With CipherTrust Transparent Encryption Ransomware Protection madhav Wed, 04/17/2024 - 05:22 Our last blog Ransomware Attacks: The Constant and Evolving Cybersecurity Threat described the ever dangerous and evolving cybersecurity threat of ransomware.

article thumbnail

Google found zero-click vulnerabilities in Apple’s multimedia processing components

Security Affairs

The discovery urges Apple into implementing additional security measures to protect these components, following the approach already adopted by Google to protect multimedia processing libraries. Multimedia processing libraries are used by the modern mobile OS to automatically manage multimedia files (i.e. images, audio, and videos).

Libraries 118