Severe Vulnerability Fixed In Cisco Firepower Management Center

0
[ad_1]

Cisco recently addressed a high-severity vulnerability in its Firepower Management Center software with the latest update. The firm urged users to upgrade to the latest software releases to receive the patch, as no workarounds exist to mitigate the flaw.

Cisco Patched The Firepower Management Center Vulnerability

The networking giant Cisco recently fixed a high-severity SQL injection vulnerability in its Cisco Firepower Management Center software. Exploiting the flaw could let an authenticated remote adversary target vulnerable systems.

Firepower Management Center (FMC) is a dedicated administrative center from Cisco, providing users with a unified platform to manage different Cisco security products. This includes seamless management of firewalls, URL filtering, application control, intrusion prevention, and malware protection.

According to its advisory, the vulnerability affected the web-based management interface of the FMC software. The flaw existed due to an improper input validation in the web-based management interface. Consequently, an authenticated attacker could exploit the flaw by sending maliciously crafted SQL queries to the target system.

Exploiting the flaw required the attacker to have Read-Only credentials at the least. Once exploited, the flaw could let the attacker access data in the database, gain root privileges, and execute arbitrary codes on the target system.

This vulnerability received the CVE ID CVE-2024-20360, achieving a high-severity rating and a CVSS score of 8.8. It typically affected Cisco FMC software, and the tech giant confirmed Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software to remain safe from this flaw.

The firm credited the security researcher with the alias SunD0y with reporting the flaw. Cisco also confirmed detecting no active exploitation attempts for this flaw in the wild.

To help users update their systems with the patched FMC releases, Cisco also released a Software Checker tool. Using this tool, users may search for the latest Cisco advisories addressing any security flaws with the latest releases.

Let us know your thoughts in the comments.


[ad_2]
Source link

ASUS Prime GeForce RTX 40 Compact GPUs

0
[ad_1]

ASUS debuts new compact NVIDIA GPUs at Computex 2024

At Computex this week, ASUS had a slew of announcements to unveil, including new Prime GeForce RTX 40 compact GPUs, this is part of NVIDIA’s SFF-ready program – which stands for Small Form Factor. As GPUs continue to get larger and larger, it’s getting tougher and tougher to fit them into many cases. However, these new Prime GeForce RTX 40 models are much smaller and should fit in most cases.

ASUS is one of the first partners for NVIDIA with its SFF-ready program, and is offering the Prime GeForce RTX 4070 SUPER, Prime GeForce RTX 4070, and Prime GeForce RTX 4060 Ti. This is why ASUS has earned a Best of Computex 2024 award from Android Headlines.

ASUS focuses on function over design

With the new Prime GeForce RTX 40 GPUs, ASUS has decided to focus on function over design with these models. So they are available in a minimal design with a black-and-white color scheme, along with subtle RGB lighting effects. For those who are looking for a flashy GPU, this isn’t going to be what you’re looking for.

This fits right in with the ASUS Prime Ecosystem of PC DIY Components, allowing you to build or upgrade your rig with ease, which is important in the PC Master Race.

ASUS hasn’t yet confirmed pricing or availability for the Prime GeForce RTX 40 Compact GPUs, but that is pretty common for products announced at trade shows like Computex. ASUS did say, however, that they would “hit the shelves very soon”, typically that means within a month or two. So we can see these new compact GPUs available later this summer.

Taking NVIDIA’s best GPUs (so far) and shrinking them down into smaller GPUs that will fit in most cases is why we have awarded ASUS a Best of Computex 2024 award for the new Prime GeForce RTX 40 Compact GPUs.


[ad_2]
Source link

Acer Predator X34 X5 gaming monitor

0
[ad_1]

The Acer Predator X34 X5 monitor levels up your gaming

Gaming is about many things these days and one of those things can be having your games look as good as possible. Enter the Predator X34 X5 gaming monitor from Acer. The company’s latest iteration of the Predator X34 series. It features a stunning 34-inch OLED panel with an ultrawide design and a UWQHD resolution of 3,440 x 1,440. Suffice it to say, it’s a beautiful monitor to look at, even when there’s nothing on the screen.

Of course, it certainly looks better when you’re playing games on it than just sitting there. But its aesthetics do deserve to be appreciated. And it most certainly has some beautiful aesthetics. Not just because of the 1800R curved panel, but also the sleek metal stand that the monitor sits on. Which by the way, allows the monitor to tilt and swivel. You can adjust the height too. I had the opportunity to try one of the older Predator X34 monitors out and it was one of the best gaming monitors I’ve ever played games on. Acer has only made the monitor better with all the upgrades.

The new Predator X34 X5 monitor also comes with multiple HDMI 2.1 ports as well as DisplayPort 1.4 and USB Type-C connectivity. This is why the Acer Predator X34 X5 earned the Best of Computex 2024 award from Android Headlines.

The Acer Predator X34 X5’s 240Hz refresh helps games look ultra-smooth

A monitor with a fast refresh rate can really boost the gaming experience. While not absolutely necessary, a monitor with a fast refresh rate certainly makes gameplay smoother and it can give you an advantage in multiplayer games. The Acer Predator X34 X5 delivers here with a 240Hz panel with a lightning-fast 0.03ms response time. Additionally, it features two 5-watt speakers built-in. Whether you’re using this monitor for a console or PC, the built-in speakers mean you don’t need to have external audio sources to hear your games or other content.

The monitor also has a built-in KVM switch. Meaning if you have two PCs hooked up to it, you can use one keyboard and mouse to swap between the two pretty effortlessly. Additionally, the Acer Predator X34 X5 supports both AMD FreeSync Premium Pro and NVIDIA G-Sync. This is easily one of Acer’s best gaming monitors to date, and it’s why we awarded the Predator X34 X5 the Best of Computex 2024 award.


[ad_2]
Source link

Google Maps users will have to decide when they want Google to auto-delete Timeline data

0
[ad_1]
Google is making a change to how it keeps your Google Maps location data. Once backed up using cloud-based servers, this information will end up being stored on-device instead. An email sent by Google to Maps users says that they have until December 1st to save all of their old journeys on their devices before this data is deleted. Keep in mind that Google is changing the name of the feature you might know as Location History to Timeline.
Timeline (formerly Location History) is a personal map that allows you to remember routes and trips you’ve taken and places that you’ve visited in the past so that you can visit them again. Per The Verge, instead of having all of this data connected to your Google account, it will be stored on your iOS or Android phone. This means that you will no longer be able to view your Timeline from the web starting in December. Moving this data on-device is supposed to improve the privacy of the information since it won’t be stores in the cloud.

But as we noted, if you use Google Maps, you will have a decision to make. You have until December 1st to decide how long you want to keep your Timeline data on your phone. You can choose to keep all data on-device until you delete it yourself, or select to have the data automatically deleted after 3 months, 18 months, or 36 months. If you fail to make a decision by December, Google will move the first 90 days of your travel history to the first device you sign into Google with. Any data older than 90 days will be deleted.

You can decide when you want Timeline data removed from your device automatically by opening the Google Maps app and tapping on the profile icon on the right side of the search bar on the top of the screen. Next, tap on Your timeline followed by the three-dot menu icon on the upper right of the display. From the pop-up menu that appears at the bottom of the screen, choose About timeline. Under the section marked Your choices, tap the link that says Go to settings.

You’ll be sent to a page titled Activity controls. Look for the Auto-delete line that says underneath Choose an auto-delete option. There is a small arrow on the right side. Tap it and you’ll have two choices. One says Don’t auto-delete activity. Tap on that if you don’t want Google to automatically delete your Timeline data from your phone. Or, you can select the other option which says Auto-delete activity and choose to have Timeline data older than 3 months, 18 months, or 36 months deleted automatically. Tap the one you want and Google will automatically remove your Timeline data older than the choice you made.

No matter what you select, Google allows you to delete any Timeline data from your phone manually.


[ad_2]
Source link

Iranian State Hackers Partner Up for Large-Scale Attacks, Report

0
[ad_1]

A Check Point Research (CPR) report reveals that state-sponsored hackers and threat actors are employing sophisticated tactics to target organizations and nations, posing a significant threat that demands immediate solutions.

The company focused on Void Manticore, an evolving threat to those opposing Iranian interests. It revealed the complicated tactics they employ to destroy their target, including a complex web of online personas, strategic collaborations, and sophisticated attack methodologies.

State-Sponsored Actors- An Evolving Threat

Void Manticore is linked to Iran’s Ministry of Intelligence and Security (MOIS) and is known for its destructive wiping attacks and sophisticated influence operations. The actor operates under various online personas, such as “Karma” in Israel and “Homeland Justice” in Albania. 

Their operations are notably influenced by their collaboration with Scarred Manticore, another Iranian MOIS-affiliated group. Both engage in a systematic handoff of targets, with Scarred Manticore accessing and exfiltrating data from targeted networks and then transitioning control to Void Manticore. 

“This strategic partnership not only amplifies the scale and impact of their attacks but also poses a formidable challenge for cybersecurity defenders,” Check Point Team noted in the blog post.

Void Manticore Modus Operandi

Void Manticore’s tactics are straightforward yet effective. Utilizing basic tools, they establish access to target networks and then deploy a range of custom wipers designed for Windows and Linux systems. Some wipers target specific files or file types while others attack the system’s partition table, rendering all data on the disk inaccessible.

Moreover, they engage in manual data destruction activities, including shared drive manipulation, to further amplify the impact of their attacks. They mostly use the CI Wiper, Partition Wipers like the LowEraser, and the BiBi Wiper.

Their most recent attacks involved the BiBi Wiper (named after Israeli Prime Minister Benjamin Netanyahu), which can corrupt files and disrupt system functionality. The group has also targeted INSTAT in Albania and multiple Israeli entities.

Iranian State Hackers Partner Up for Large-Scale Attacks, Report
The Void Manticore and Scarred Manticore connection (Screenshot: CPR)

How to Stay Safe?

Void Manticore aims to not just steal but destroy your data and cause chaos. This digital hit-and-run serves as a reminder of the constantly evolving nature of online threats. To protect yourself, stay vigilant by updating software with the latest security patches, be wary of online strangers, and use strong passwords.

  1. Hackers Target Israeli Rocket Alert App Users with Spyware
  2. Iran’s Scarred Manticore Targets Middle East with LIONTAIL Malware
  3. Deadglyph Backdoor Linked to Stealth Falcon APT in the Middle East
  4. Hackers Send Fake Rocket Alerts to Israelis via Hacked Red Alert App
  5. Hacktivists Trageting Critical ICS Infrastructure in Israel and Palestine

[ad_2]
Source link

Best of Computex 2024: ASUS ROG Ally X

0
[ad_1]

ASUS unlocks your gaming capabilities with the ROG Ally X

When ASUS launched the ROG Ally in 2023, it was positioning the handheld as your one-stop shop for playing all of your games, and not just those in your Steam library. While the Ally was and is still a very cool PC gaming handheld, the ROG Ally X brings in several improvements that make this the go-to choice between it and the older models. The ROG Ally X still uses the same AMD Ryzen Z1 Extreme APU, but it beefs up the RAM and battery and updates the SSD support for a much better gaming experience.

Let’s start with the battery life. The ROG Ally X features an 80Wh battery so you can keep playing games for longer without having to plug the handheld in. While we haven’t tested it, you can probably expect at least an additional hour of gameplay if not more. That’s pretty exciting if you have long commutes and like to play games during that time. But ASUS didn’t stop there. The ROG Ally X also has an updated design. Things aren’t massively changed here. But they have been improved in small, meaningful ways.

Like the bottom corners of the unit that rest against your palms. On the original ROG Ally, these were sharp angular lines and corners. The ROG Ally X makes things a little more ergonomic by giving these corners a more pronounced curve. This is likely to make it more comfortable to hold for longer. Speaking of ergonomics, the ROG Ally X also has more defined curves and depth for the hand grips on the back. Giving your fingers ever so slightly more room to rest back there. Because of these improvements, we’ve awarded the ASUS ROG Ally X the Best of Computex 2024 award.

The ROG Ally X has loads of meaningful improvements

A bigger battery is one of many improvements ASUS made to its handheld. It also now has 24GB of RAM compared to 16GB. This will help you allocate the APU’s resources more evenly across both the system and gaming activities, so games and tasks can run more optimally. One of the slickest upgrades though is the jump to Full M.2 2280 SSD support. The old ROG Ally uses a smaller SSD form factor. However, the new ROG Ally X is compatible with full M.2 2280 SSDs. So you can more easily upgrade the handheld’s storage if you want.

Plus, the system now comes with 1TB of internal storage as standard compared to 512GB. ASUS also made the cooling fans thinner and more efficient and even made the joysticks a little closer to the d-pad and face buttons so they’re easier to move your thumbs between. All in all, it should be a noticeably more enjoyable gaming experience than before. This is why we gave the ASUS ROG Ally X the Best of Computex 2024 award.


[ad_2]
Source link

NewsBreak was caught posting AI-generated articles

0
[ad_1]

NewsBreaks is a popular app that delivers news stories from several popular news outlets. It boasts being a source of trusty news, but recent events revealed that this might not be true. According to a new report, NewBreak was caught posting inaccurate AI-generated articles.

Right now, we’re in an age when we can’t trust whatever we see online. Granted, that’s ALWAYS been true; however, with the advent of AI-generated content, it’s much truer now. You never know if the article you read from an up-and-coming health site just came from ChatGPT. This is one thing that many people are worried about.

Over the past year and a half, we’ve actually seen several “news” sites that were completely crafted out of AI. These are sites that you need to look out for, as the information on these sites is most likely inaccurate.

NewBreak was caught posting AI-generated articles

NewBreak is an app with more than 50 million monthly active user, claims the developers. It posts news stories from several outlets including Fox, Android Police, Reuters, and CNN. The company claims to be the “go-to source for all things local.” When those poor unfortunate souls lost their lives during the Christmas Eve shooting in Bridgeton New Jersey, NewsBreak was there. Only…. there was no shooting on Christmas Eve.

While this is good news (we don’t need any more gun violence), it highlights the danger of AI-generated news. The New Jersey police department dismissed the news story and said that it was “entirely false”.

NewsBreak told Reuters that it removed the article only four days after it was posted, but that doesn’t mean that there weren’t more. In fact, there were dozens more AI-generated articles presented by NewBreak.

Since 2021, the platform has posted several AI-generated news stories, created stories with inaccurate bylines, and even taken content from competitors, according to Reuters. This is pretty significant, as a platform with more than 50 million active users has a pretty big influence on the news industry. We’re not sure how much worse AI-generated media is going to get.


[ad_2]
Source link

Google Keep may soon allow users to resize windows on their mobile devices

0
[ad_1]

Image credit: PhoneArena

According to a recent discovery, Google Keep is gearing up for a new feature that may greatly benefit users of foldable devices and tablets. An APK breakdown has revealed a work-in-progress feature within the Android app’s code, suggesting that Google is exploring the possibility of adding resizable windows. This update would allow users to freely adjust the size of the Google Keep window on their mobile devices.

This potential change could be a game-changer, particularly for users who rely on Google Keep on larger screens or devices with unique form factors. Currently, the mobile app offers limited window size options – either the default size or fullscreen mode. A resizing feature would bring it more in line with the desktop app, where a workaround extension already exists to achieve this functionality.The discovery came after activating a hidden feature flag within version 5.24.222.01.90 of the Google Keep app. This revealed a new sliding pane layout that enables users to freely adjust the window size. Notably, this layout is currently utilized only by the Google Calendar app. It appears that Google intends to extend this capability to Google Keep, initially for devices with a display density greater than 600 pixels per inch.

While this news is exciting for many Google Keep enthusiasts, it’s important to remember that features discovered through code teardowns don’t always make it to the final release. It’s possible that Google may decide not to roll out this feature after all. Nonetheless, this discovery provides a promising glimpse into the potential future of Google Keep, where users could have more control over their note-taking experience on various devices.

We eagerly await further updates from Google regarding this potential feature. If implemented, it could significantly enhance the usability and versatility of Google Keep for a wider range of users. For now, we’ll keep our eyes peeled and our fingers crossed.


[ad_2]
Source link

300+ Times Downloaded Package PyPI Contains Wiper Components

0
[ad_1]

ReversingLabs researchers recently uncovered a malicious open-source package named xFileSyncerx on the Python Package Index (PyPI).

This package, which had been downloaded nearly 300 times, contained separate malicious “wiper” components.

Initially, it raised concerns about being an open-source supply chain threat.

However, further investigation revealed that the downloader and wipers were created by a cybersecurity professional conducting “red team” penetration testing of a client’s Security Operations Center (SOC).

This incident underscores a significant challenge for firms tracking and mitigating open-source threats: the “noise” created by grayware such as test packages and low-quality, low-distribution malicious packages.

As attention to open-source and supply chain threats increases, this low signal-to-noise ratio complicates the identification and remediation of legitimate threats.

Analyze any MaliciousURL, Files & Emails & Configuration With ANY RUN Start your Analysis

Research Methodology

ReversingLabs researchers regularly scan open-source repositories like npm, GitHub, and PyPI for suspicious and malicious packages using their Spectra family of software supply chain security technology.

They look for characteristics correlating malicious or compromised code, such as communication with predefined external servers or dependencies on known malicious packages.

A common red flag is code obfuscation, which was present in the xFileSyncerx package.

The xFileSyncerx Package

The xFileSyncerx package, posted in April by a newly created PyPI account, contained obfuscated code that flagged it for further inspection.

The obfuscation involved a malicious download URL stored as a sequence of characters inside an array, further obfuscated with bitwise shifts.

When de-obfuscated, the URL pointed to a file hosted in a GitHub repository: hxxps://raw.githubusercontent.com/d3duct1v/tester-of-trees/main/s2.py.

Second Stage Malware: s2.py

The s2.py file, downloaded by xFileSyncerx, is the second stage malware.

It is actively maintained on GitHub by the user d3duct1v and has undergone more than 20 commits since its initial posting.

The s2.py malware encrypts files in the /home directory using the Fernet symmetric encryption algorithm, excluding hidden files and directories.

This exclusion likely ensures that SSH functionality remains intact for further malware operations.

After encrypting files, the s2.py malware attempts to spread across the local network using hard-coded SSH credentials.

If successful, it downloads and executes a third-stage malware, s3.py, which contains only the wiper functionality.

Hard-coded credentials and IP addresses were used to suggest a targeted attack or a test environment.

Red Team ‘Litter’ and Open Source Threat Noise

Upon deeper investigation, ReversingLabs contacted the individual behind the d3duct1v account, who confirmed that the xFileSyncerx package was part of a red team assessment.

The package was designed to test the client’s SOC’s ability to detect suspicious activities and lateral movement.

The author planned to remove the package before ReversingLabs’ intervention, and both the xFileSyncerx and associated malware were subsequently removed from PyPI and GitHub.

The discovery of xFileSyncerx highlights the problem of growing “noise” on open-source repositories.

As supply chain threats and attacks become more prominent, the mix of goodware, malware, and grayware complicates threat assessment.

Red team packages like xFileSyncerx add to this challenge, suggesting a need for clearer guidelines and better demarcation of test and grayware packages to prevent confusion among developers and security teams.

Downloader code inside xfilesyncerx.py file

While the xFileSyncerx package was not the next “Mirai” or part of a significant supply chain attack, its discovery reminds us of the complexities and challenges of monitoring open-source repositories.

The incident calls for improved practices in publishing and identifying test packages to ensure the security and integrity of open-source ecosystems.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo 


[ad_2]
Source link

iPhone guaranteed update support is below Google & Samsung

0
[ad_1]

Apple has officially set a guaranteed software support period of 5 years for iPhone devices. This confirms that, currently, companies like Google and Samsung already offer a longer guaranteed update period for their flagships.

On April 29, the new PSTI regulation came into force in the UK. It includes new requirements for internet-connected products to guarantee user security and privacy. One of those requirements for companies is to set a “Defined Support Period.” This term refers to the minimum update support period that their products will receive. So, Apple was forced to officially confirm for the first time a minimum period during which devices, like the iPhone, will get guaranteed updates.

Apple officially guarantees 5 years of updates for iPhones

Apple has never detailed how many updates an iPhone will receive. However, users had no complaints in this regard, thanks to the long period of support they usually offer. That said, in compliance with the PSTI, the company has officially set a 5-year “Defined Support Period” for iPhone devices. It’s noteworthy that this is a minimum period. So, the company can send updates for longer, just as it has done before.

For example, the iPhone XS will be 6 years old in September. However, it has continued to receive updates beyond the 5 years guaranteed by Apple. It will be interesting to see if the company also ships iOS 18 to this generation of iPhones. The “Defined Support Period” begins counting from the “first supply date,” according to the document. In the case of the iPhone 15 Pro Max, its first supply date is September 22, 2023.

Samsung and Google are ahead in terms of guaranteed updates

That said, Google and Samsung have explicitly guaranteed “at least” 7 years of software support. This is valid for the Pixel 8 and Galaxy S24 series. The Pixel 8a, Google’s latest mid-ranger, also boasts the same software support. In the case of Samsung, only the Galaxy S24 series is guaranteed this treatment. The South Korean giant is likely to reserve this “special treatment” for its premium flagship devices. Meanwhile, the company provides support for 4 years of Android updates to mid-range devices such as the Galaxy A55 and Galaxy A35.

Android devices surpassing Apple’s update period was unthinkable a few years ago. This demonstrates the good work that Google and Samsung have been doing lately. Could other Android brands catch up in the near future? Only time will tell. Currently, companies like Xiaomi and OPPO offer up to 4 years of Android updates. However, similar to Samsung, this applies to flagships and selected premium mid-rangers.

iPhone 5 years guaranteed update support
Source: Android Authority

[ad_2]
Source link