in ,

FreeBuf Morning News | Microsoft plans to gradually abandon VBScript in the second half of this year; UserPro plug-in has a vulnerability


Global News

1. The Central Cyberspace Affairs Commission and four other departments issued the “Regulations on the Security Management of Internet Government Applications”

The term “Internet government affairs applications” as mentioned in these regulations refers to portals established by government agencies and public institutions on the Internet, mobile applications (including mini programs), public accounts, etc. that provide public services through the Internet, as well as Internet email systems. 【Read the original article

2. The UK will propose a mandatory reporting system for ransomware attacks and a licensing system for all payments

Even if the proposals cannot be implemented immediately, they mark a major change in the way governments around the world are responding to the ransomware crisis. The UK is playing a major role in the anti-ransomware initiative, a move that is likely to be followed by the other 48 participating countries.Read the original article

3. The U.S. Cybersecurity and Infrastructure Security Agency releases “Encrypted DNS Implementation Guide”

This document is intended to provide implementation guidance for federal agencies to meet federal requirements related to Domain Name System (DNS) traffic encryption set forth in Office of Management and Budget (OMB) Memorandum M-22-091 and to enhance the cybersecurity of their IT networks. situation. 【Read the original article

4. Microsoft plans to phase out VBScript in the second half of 2024

Naveen Shankar, a Microsoft project manager, said: Over the years, technology has continued to advance, and more powerful and versatile scripting languages ​​such as JavaScript and PowerShell have emerged. These languages ​​provide a wider range of functions and are more suitable for modern network development and automation tasks.Read the original article

5. In Inner Mongolia, an Internet troll gang was busted, and 13 people were sentenced!

The gang members disguised themselves as journalists and wrote and published false information about factories and mines on more than 30 online self-media accounts registered by them. They then spread the information to each other, forcing the companies to “spend money to delete the posts” and engaging in criminal activities such as extortion and illegal operations.Read the original article

6. The new malware “GhostEngine” is designed for stealth and can bypass EDR defense systems

In the case of the GhostEngine malware, its primary goal is to disable endpoint security solutions and disable specific Windows event logs, such as the security and system logs that record process creation and service registration.Read the original article

Security incidents

1. Iranian hacker group launches violent attack on Israel

According to reports, so far, Void Manticore, an advanced hacker group (APT) under Iran’s Ministry of Intelligence and Security (MOIS), claims to have successfully attacked more than 40 Israeli organizations and has also launched multiple high-profile attacks in Albania. 【Read the original article

2. Anyone can trick an AI bot into revealing your password

The Immersive Labs team found that generative AI chatbots can be easily manipulated by people of all skill levels, not just network experts. The observation was made as part of a prompt injection competition, in which 34,555 participants tried to trick the chatbot into revealing their password using different prompts.Read the original article

3. Security company warns that hackers are using PuTTY/WinSCP fake websites to divert traffic and provide malicious Trojans to victims

Researchers pointed out that this wave of attacks is likely to target IT system administrators/router enthusiasts, because these users often use the above two software. Since such administrator accounts have higher permissions, once hackers succeed, they have the opportunity to quickly penetrate the internal network environment of the enterprise and steal various confidential data.Read the original article

4. UserPro plugin has a vulnerability that may lead to account takeover

The vulnerability in the UserPro plug-in is considered a critical vulnerability because it allows a potential attacker to change a user's password using a keyset that is typically used when a user requests a password reset. An attacker could exploit this vulnerability by initiating a password reset and then intercepting or manipulating the secret key before the legitimate user completes the process. 【Foreign Journal-Read the original article

5. Blackbasta claims to have hacked ATLAS, one of the largest oil distributors in the United States

The group claims to have stolen 730GB of data from ATLAS, including company data: accounts, human resources, finance, executives, department data, and user and employee data. Currently, the oil company has not disclosed the incident.Read the original article

6. CentroMed data breach exposes 400,000 patient records

In response to the CentroMed cyberattack, the healthcare provider took several steps to mitigate the impact on affected individuals. CentroMed began notifying individuals whose information may have been compromised on May 17. In addition, a dedicated toll-free call center has been set up to address any questions or concerns from affected individuals. 【Foreign Journal-Read the original article

High quality articles

1. Under the “involutionary vortex”, will going overseas become a new way out for cybersecurity companies?

With the digital transformation of enterprises, the globalization and industrialization of cybercrime, and major changes in global geopolitics and economy, Chinese cybersecurity companies are facing unprecedented opportunities and challenges in the domestic and global markets. Therefore, “going overseas” has become a new direction that many manufacturers have to think about, instead of being unfamiliar, distant and unpopular.Read the original article

2. How to “kill” intelligent driving with a red balloon?

In the field of autonomous driving, visual large models (VLMs) have always been highly anticipated and have broad application prospects. For example, by integrating language data, vehicles and traffic systems can deeply understand the real environment and improve driving safety and efficiency. Although VLMs have the ability to understand and make decisions in complex scenarios, integrating them into autonomous driving systems still poses serious safety risks.Read the original article

3. About the code audit of thinkphp framework

At present, many PHP applications are developed based on ThinkPHP, so it cannot be bypassed in the process of learning code auditing. This article will be divided into two parts to introduce code auditing based on the thinkphp framework. The first part mainly introduces the framework. Basic pre-knowledge, the second part introduces the auditing skills of the thinkphp framework. 【Read the original article

*The content of this article is collected from media and publications around the world. The producer is responsible for its completeness, but is not responsible for its authenticity and validity.

*The content marked as[Foreign Journal]mainly comes from media and publications in English-speaking countries. Some content requires registration for a free account before you can read it.

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Chinese actor ‘Unfading Sea Haze’ remained undetected for five years

Bing API service also failed, DuckDuckGo and Copilot also failed to work properly.