Zero-day deploys remote code execution vulnerability via Word documents

Categories: Business

Tags: microsoft

Tags: zero-day

Tags: exploit

Tags: CVE-2023-36884

Tags: storm-0978

Tags: email

Tags: phish

Tags: phishing

Tags: Ukraine

We take a look at reports of an exploit being deployed via booby trapped Word documents.

(Read more…)

The post Zero-day deploys remote code execution vulnerability via Word documents appeared first on Malwarebytes Labs.

Read more

SEO Expert Hired and Fired By Ashley Madison Turned on Company, Promising Revenge

Credit to Author: BrianKrebs| Date: Thu, 13 Jul 2023 21:45:02 +0000

[This is Part II of a story published here last week on reporting that went into a new Hulu documentary series on the 2015 Ashley Madison hack.] It was around 9 p.m. on Sunday, July 19, when I received a message through the contact form on KrebsOnSecurity.com that the marital infidelity website AshleyMadison.com had been hacked. The message contained links to confidential Ashley Madison documents, and included a manifesto that said a hacker group calling itself the Impact Team was prepared to leak data on all 37 million users unless Ashley Madison and a sister property voluntarily closed down within 30 days.

Read more

Platform Approach to Cybersecurity: The New Paradigm

Credit to Author: Jon Clay| Date: Thu, 13 Jul 2023 00:00:00 +0000

Embracing platform approach as the path to enhanced security and resilience

Read more

Google Bard launches in EU, overcoming data privacy concerns in the region

Google has announced it is making its Bard chatbot available in the EU and Brazil, five months after the company opened it up for early access. To date, residents in EU countries have been unable to access the company’s ChatGPT rival due to issues surrounding data privacy concerns.

In addition to making Bard more widely available, Google has also introduced a host of new features including text-to-speech capabilities, shareable Bard conversation links, Google Lens compatibility, and the ability to customize Bard responses — for example, adjusting for tone and style.

To read this article in full, please click here

Read more

Detecting BPFDoor Backdoor Variants Abusing BPF Filters

Credit to Author: Fernando Merces| Date: Thu, 13 Jul 2023 00:00:00 +0000

An analysis of advanced persistent threat (APT) group Red Menshen’s different variants of backdoor BPFDoor as it evolves since it was first documented in 2021.

Read more