This research was performed by Sudhir Devkar of the Threat Analysis Unit (TAU) Summary RuRansom is ransomware that is specifically targeting Russian systems. During ongoing cyber warfare between Russia and Ukraine, TAU has already seen different malware-attacks like WhisperGate, IsaacWiper, and HermeticWiper. RuRansom is a new addition to this destructive malware series. It is purposefully … ContinuedThe post RuRansom – A Retaliatory Wiper appeared first on VMware Security Blog.
More info:
https://blogs.vmware.com/security/2022/04/ruransom-a-retaliatory-wiper.html?utm_source=rss&utm_medium=rss&utm_campaign=ruransom-a-retaliatory-wiper
Linux kernel vulnerabilities CVE-2020-36322 and CVE-2021-28950 Security Advisory Security Advisory Description CVE-2020-36322 An issue was discovered in the FUSE filesystem implementation in the ...
More info:
https://support.f5.com/csp/article/K01311152?utm_source=f5support&utm_medium=RSS
Initial Publication Date: 2022/04/11 16:45 PST Last Updated Date: 2022/04/12 13:00 PST A security researcher recently reported an issue with Aurora PostgreSQL. Using this issue, they were able to gain access to internal credentials that were specific to their Aurora cluster. No cross-customer or cross-cluster access was possible; however, highly privileged local database users who could exercise this issue could potentially have gained additional access to data hosted in their cluster or read
More info:
https://aws.amazon.com/security/security-bulletins/AWS-2022-004/
node-ipc vulnerability CVE-2022-23812 Security Advisory Security Advisory Description This affects the package node-ipc from 10.1.1 and before 10.1.3. This package contains malicious code, that ...
More info:
https://support.f5.com/csp/article/K42801711?utm_source=f5support&utm_medium=RSS
Apache vulnerability CVE-2022-22721 Security Advisory Security Advisory Description If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an ...
More info:
https://support.f5.com/csp/article/K20451100?utm_source=f5support&utm_medium=RSS
VMware is making the effort to actively align with a global network of industry and public sector organizations focused on early warning and rapid response efforts to protect your organization’s infrastructure. Moving in sync with the Joint Cyber Defense Collaborative (JCDC) convened by the U.S. Cyber and Infrastructure Security Agency (CISA), VMware’s goal is to … ContinuedThe post Deconstructing Destructive Attacks to Separate Fiction from Facts: Webinar Exclusive 5/3
More info:
https://blogs.vmware.com/security/2022/04/deconstructing-destructive-attacks-to-separate-fiction-from-facts-webinar-exclusive-5-3.html?utm_source=rss&utm_medium=rss&utm_campaign=deconstructing-destructive-attacks-to-separate-fiction-from-facts-webinar-exclusive-5-3
Initial Publication Date: 2022/04/11 16:45 PST A security researcher recently reported an issue with Aurora PostgreSQL. Using this issue, they were able to gain access to internal credentials that were specific to their Aurora cluster. No cross-customer or cross-cluster access was possible; however, highly privileged local database users who could exercise this issue could potentially have gained additional access to data hosted in their cluster or read files within the operating system of the
More info:
https://aws.amazon.com/security/security-bulletins/AWS-2022-004/