#8 - GameOverlay – privilege escalation vulnerabilities in Ubuntu
🍿🔒 Ubuntu flaws, Redis attacks, Jumpcloud breach - all in this month's "Crying Out Cloud" episode! 🕵️♂️📺
👀 Here's a sneak peek at today’s episode:
🔒 Stay ahead of the game! LAPSUS$ Hackers may be making waves. Two members of this notorious group faced consequences in the UK, but shockingly, they continued their hacking activities even while under house arrest.
🤖 Data Poisoning in AI Training is a growing concern. Hackers can manipulate the data used to train AI models, introducing risks and vulnerabilities. Validating data integrity and randomizing data ingestion times are useful mitigations against this threat.
💻 The WinRAR Vulnerability (CVE-2023-38831)! This flaw was exploited against crypto-traders to infect their devices with malware, but should be considered a low concern for cloud customers unless using virtual desktops.
https://gizmodo.com/hackers-lapsus-uber-nvidia-rockstar-games-microsoft-1850766324 https://www.bbc.com/news/technology-66549159 https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-executive-summary https://www.cisa.gov/sites/default/files/2023-08/CSRB_Lapsus%24_508c.pdf https://duo.com/decipher/lapsususd-analysis-finds-need-for-better-iam-mfa-deployments https://www.youtube.com/watch?v=h9jf1ikcGyk https://arxiv.org/pdf/2302.10149.pdf https://www.blackhat.com/us-23/briefings/schedule/#poisoning-web-scale-training-datasets-is-practical-32112 https://arstechnica.com/security/2023/08/winrar-0-day-that-uses-poisoned-jpg-and-txt-files-under-exploit-since-april/
🍿🔒 Ubuntu flaws, Redis attacks, Jumpcloud breach - all in this month's "Crying Out Cloud" episode! 🕵️♂️📺
Corey Quinn joins "Crying Out Cloud" to discuss cloud evolution, Microsoft MSA, usage & misconfigurations
On this episode: Chinese hackers breach US emails. Silent Bob & Team TNT return. Russian hackers exploit Office Zero Day
Stay Safe & Informed: Receive the Latest Cloud Security News, Real Attack Insights, and Expert Guidance to Protect Your Environment.
Our round up of the latest cloud security vulnerabilities and innovations that are shaking up the industry and need your attention.
An inside look at our research data - based on statistics from real attack paths we detected in real cloud environments.
Tips from our Threat Research team on how to prevent data breaches in your company and how to improve your overall cloud security strategy.
Sign up to receive the latest updates in cloud security directly to your inbox