Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Microsoft: New RAT malware used for crypto theft, reconnaissance

Bleeping Computer - 17 Březen, 2025 - 19:59
​Microsoft has discovered a new remote access trojan (RAT) that employs "sophisticated techniques" to avoid detection, maintain persistence, and extract sensitive data. [...]
Kategorie: Hacking & Security

OKX suspends DEX aggregator after Lazarus hackers try to launder funds

Bleeping Computer - 17 Březen, 2025 - 19:23
OKX Web3 has decided to suspend its DEX aggregator services to implement security upgrades following reports of abuse by the notorious North Korean Lazarus hackers, who recently conducted a $1.5 billion crypto heist. [...]
Kategorie: Hacking & Security

Google to replace its assistant with Gemini in Android

Computerworld.com [Hacking News] - 17 Březen, 2025 - 19:06

It is now clear that Google Assistant will be replaced by generative AI (genAI) tool Gemini in most Android-based phones. The process is expected to begin shortly and be completed before the end of the year, according to the official Google blog The Keyword.

Mobile phones running Android 9 or earlier will not be affected by the decision, as they would likely run into problems using Gemini.

In addition to smartphones, Gemini will also be integrated into tablets, smart watches, televisions, monitors, cars and headphones, according to 9to5Google.

Kategorie: Hacking & Security

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

The Hacker News - 17 Březen, 2025 - 18:08
A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure. The vulnerability, tracked as CVE-2025-24813, affects the below versions - Apache Tomcat 11.0.0-M1 to 11.0.2 Apache Tomcat 10.1.0-M1 to 10.1.34 Apache Tomcat 9.0.0-M1 to 9.0.98 It
Kategorie: Hacking & Security

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

The Hacker News - 17 Březen, 2025 - 18:08
A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure. The vulnerability, tracked as CVE-2025-24813, affects the below versions - Apache Tomcat 11.0.0-M1 to 11.0.2 Apache Tomcat 10.1.0-M1 to 10.1.34 Apache Tomcat 9.0.0-M1 to 9.0.98 It Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Apple has to climb the mountain

Computerworld.com [Hacking News] - 17 Březen, 2025 - 17:55

Apple has a lot of challenges these days. Would Steve Jobs really be handling these problems better than current leaders?

The problems, some are long-term, others short-term, include (but are not confined to):

  • Chinese consumers turning to domestic brands in response to the US trade war.
  • US customers feeling the impact of tariffs and anticipated increase in product prices.
  • Regulators in every nation seemingly intent on chipping away at the services empire Apple built from thin air. 
  • Apple’s recently-disclosed failure to launch with Apple Intelligence.
  • Supply chain problems, partly in response to trade wars and partly exposed during Covid, when single-source supply chains collapsed overnight.
  • Declining consumer trust in technology.

These challenges are in addition to the tasks Apple has always had to manage — maintaining hardware and software quality, developing new products and services that surprise and delight customers, building consumer engagement, and inventing the best hardware in the world. A look at the recently introduced Mac Studio and M4 MacBook Air  show the company still has the ability to do that. Both are the best computers in the world in their class.

Challenges everywhere

But the central problem Apple has is mirrored in its own actions. 

You see, reports claim the company’s marketing teams insisted on promoting Apple Intelligence and its much-vaunted contextual understanding of users, even though the feature wasn’t ready. They not only insisted on it, but they also went large on pushing it, helping build just the right environment to create a crisis of belief when it was revealed the company would be unable to make the grade. (Subsequent reports suggest the feature is already working, but just not consistently enough; perhaps Apple should introduce it as a public beta to show how far it’s come.)

What problem does this mirror? 

Just as Apple’s own teams focused on a service that wasn’t ready, the rest of us out here continue to seek solace in impossible dreams. We live in a world of confusion in which populists, snake oil salesmen, and fake thought leaders thrive. Lack of belief, combined with a search for easy answers, means we choose the answers that seem easy. That’s what happened with Apple Intelligence — so great was the need to seem to occupy space in AI, the company chose to market a feature it hadn’t got working yet. 

It took an easy road, rather than a hard one, and in doing so reflected the muddy waters of our times.

That’s not how things were when Jobs introduced the iMac, iPod, or iPhone. Back then, we thought tech would help us, social media hadn’t yet been weaponized against wider public good, and many still wanted to believe global governments would meet the goals of Agenda 21, rather than using 1984 as an instruction manual. Conflict hadn’t yet exposed the deep rifts underlying the fragile global consensus, and Apple under Jobs spoke a language of hope and optimism that reflected a more optimistic zeitgeist

Apple today can’t cling to that past. 

A new language for a new time

That aspect of the brand no longer seems to match the existence so many of its customers experience. And it’s arguable whether senior management, ensconced in the Silicon Valley bubble, is exposed enough to identify a product design and marketing language that resonates in our new, highly complex, polarized, conflicted reality. While Apple has done extraordinarily well as the ultimate aspirational brand and enthusiasm for its products will remain among those who can reasonably afford them. But declining sales means declining profits, and in a world set up to mirror Wall Street’s irrational belief that perpetual growth is possible on a finite planet, decline is unacceptable.

That’s true even for the most successful company in human history.

That’s a lot of pressure for Apple’s top brass to handle. Plus, of course, in every case, the answers they have available to them appear to be least-worse responses, rather than good ones. Adding additional complexity, the challenges are themselves intertwined as societies everywhere undergo significant structural change, as political forces of various hues attempt to hold things together with false narratives of a history that never really happened. 

Just how can the future look better tomorrow when it’s based on a past that never existed? 

The journey

All the same, the more complex things become, the harder we work just to stand still. And with myriad connected challenges, it’s not at all certain even Steve Jobs would be able to visualize an easy way through. The simple answer is to keep hope alive, but the uncomfortable truth is that, just as it did with the iMac, Apple’s biggest challenge now is to find a consumer product truly emblematic of its time, something that speaks to us of who are we, what we need, and where we are going. 

In that light, perhaps the failure of the launch of Apple Intelligence really reflects the time we’re in. We can see the mountain but can’t yet make it to the top.

You can follow me on social media! Join me on BlueSky,  LinkedIn, and Mastodon.

Kategorie: Hacking & Security

Announcing OSV-Scanner V2: Vulnerability scanner and remediation tool for open source

Google Security Blog - 17 Březen, 2025 - 17:46
Posted by Rex Pan and Xueqin Cui, Google Open Source Security Team

In December 2022, we released the open source OSV-Scanner tool, and earlier this year, we open sourced OSV-SCALIBR. OSV-Scanner and OSV-SCALIBR, together with OSV.dev are components of an open platform for managing vulnerability metadata and enabling simple and accurate matching and remediation of known vulnerabilities. Our goal is to simplify and streamline vulnerability management for developers and security teams alike.

Today, we're thrilled to announce the launch of OSV-Scanner V2.0.0, following the announcement of the beta version. This V2 release builds upon the foundation we laid with OSV-SCALIBR and adds significant new capabilities to OSV-Scanner, making it a comprehensive vulnerability scanner and remediation tool with broad support for formats and ecosystems. 



What’s newEnhanced Dependency Extraction with OSV-SCALIBR

This release represents the first major integration of OSV-SCALIBR features into OSV-Scanner, which is now the official command-line code and container scanning tool for the OSV-SCALIBR library. This integration also expanded our support for the kinds of dependencies we can extract from projects and containers:

Source manifests and lockfiles:

  • .NET: deps.json

  • Python: uv.lock

  • JavaScript: bun.lock

  • Haskell: cabal.project.freeze, stack.yaml.lock

Artifacts:

  • Node modules

  • Python wheels

  • Java uber jars

  • Go binaries


Layer and base image-aware container scanning

Previously, OSV-Scanner focused on scanning of source repositories and language package manifests and lockfiles. OSV-Scanner V2 adds support for comprehensive, layer-aware scanning for Debian, Ubuntu, and Alpine container images. OSV-Scanner can now analyze container images to provide:


  • Layers where a package was first introduced

  • Layer history and commands

  • Base images the image is based on (leveraging a new experimental API provided by deps.dev).

  • OS/Distro the container is running on

  • Filtering of vulnerabilities that are unlikely to impact your container image



This layer analysis currently supports the following OSes and languages:


Distro Support:

  • Alpine OS

  • Debian

  • Ubuntu


Language Artifacts Support:

  • Go

  • Java

  • Node

  • Python



Interactive HTML output

Presenting vulnerability scan information in a clear and actionable way is difficult, particularly in the context of container scanning. To address this, we built a new interactive local HTML output format. This provides more interactivity and information compared to terminal only outputs, including:

  • Severity breakdown

  • Package and ID filtering

  • Vulnerability importance filtering

  • Full vulnerability advisory entries



And additionally for container image scanning:

  • Layer filtering

  • Image layer information

  • Base image identification


Illustration of HTML output for container image scanning


Guided remediation for Maven pom.xml

Last year we released a feature called guided remediation for npm, which streamlines vulnerability management by intelligently suggesting prioritized, targeted upgrades and offering flexible strategies. This ultimately maximizes security improvements while minimizing disruption. We have now expanded this feature to Java through support for Maven pom.xml.

With guided remediation support for Maven, you can remediate vulnerabilities in both direct and transitive dependencies through direct version updates or overriding versions through dependency management.


We’ve introduced a few new things for our Maven support:

  • A new remediation strategy override.

  • Support for reading and writing pom.xml files, including writing changes to local parent pom files. We leverage OSV-Scalibr for Maven transitive dependency extraction.

  • A private registry can be specified to fetch Maven metadata.

  • A new experimental subcommend to update all your dependencies in pom.xml to the latest version.


We also introduced machine readable output for guided remediation that makes it easier to integrate guided remediation into your workflow.


What’s next?

We have exciting plans for the remainder of the year, including:

  • Continued OSV-SCALIBR Convergence: We will continue to converge OSV-Scanner and OSV-SCALIBR to bring OSV-SCALIBR’s functionality to OSV-Scanner’s CLI interface.

  • Expanded Ecosystem Support: We'll expand the number of ecosystems we support across all the features currently in OSV-Scanner, including more languages for guided remediation, OS advisories for container scanning, and more general lockfile support for source code scanning.

  • Full Filesystem Accountability for Containers: Another goal of osv-scanner is to give you the ability to know and account for every single file on your container image, including sideloaded binaries downloaded from the internet.

  • Reachability Analysis: We're working on integrating reachability analysis to provide deeper insights into the potential impact of vulnerabilities.

  • VEX Support: We're planning to add support for Vulnerability Exchange (VEX) to facilitate better communication and collaboration around vulnerability information.


Try OSV-Scanner V2

You can try V2.0.0 and contribute to its ongoing development by checking out OSV-Scanner or the OSV-SCALIBR repository. We welcome your feedback and contributions as we continue to improve the platform and make vulnerability management easier for everyone.

If you have any questions or if you would like to contribute, don't hesitate to reach out to us at [email protected], or post an issue in our issue tracker.
Kategorie: Hacking & Security

Supply chain attack on popular GitHub Action exposes CI/CD secrets

Bleeping Computer - 17 Březen, 2025 - 16:24
A supply chain attack on the widely used 'tj-actions/changed-files' GitHub Action, used by 23,000 repositories, potentially allowed threat actors to steal CI/CD secrets from GitHub Actions build logs. [...]
Kategorie: Hacking & Security

Microsoft: March Windows updates mistakenly uninstall Copilot

Bleeping Computer - 17 Březen, 2025 - 14:39
​Microsoft says the March 2025 Windows cumulative updates automatically and mistakenly remove the AI-powered Copilot digital assistant from some Windows 10 and Windows 11 systems. [...]
Kategorie: Hacking & Security

Critical RCE flaw in Apache Tomcat actively exploited in attacks

Bleeping Computer - 17 Březen, 2025 - 14:29
A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request. [...]
Kategorie: Hacking & Security

Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year

The Hacker News - 17 Březen, 2025 - 14:12
An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to deliver Mirat botnet malware variants since at least May 2024. The vulnerability in question is CVE-2025-1316 (CVSS v4 score: 9.3), a critical operating system command injection flaw that an attacker could exploit to achieve remote code execution on susceptible devices by means of a
Kategorie: Hacking & Security

Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year

The Hacker News - 17 Březen, 2025 - 14:12
An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to deliver Mirat botnet malware variants since at least May 2024. The vulnerability in question is CVE-2025-1316 (CVSS v4 score: 9.3), a critical operating system command injection flaw that an attacker could exploit to achieve remote code execution on susceptible devices by means of a Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Cisco’s AI agents for Webex aim to improve customer service

Computerworld.com [Hacking News] - 17 Březen, 2025 - 14:05

Cisco is adding new features to its Webex collaboration tool as it expands its adoption of agentic AI.

The latest tools include an AI Agent and an updated AI Assistant for the company’s Webex Contact Center, a collaborative tool that helps companies handle customer service calls. The AI tools are designed to bolster customer service experiences.

The announcements came on the opening day of the Enterprise Connect show in Orlando, FL.

The Webex AI Agent, slated to be available at the end of this month, should make customer service calls smoother by using AI alongside human agents. The goal is to reduce wait times and use intelligent ways to resolve issues.

According to Cisco, the Agent will allow companies to tackle complex real-time customer service queries by handling more dynamic conversations. The tool can also run scripted agents with preconfigured responses, Cisco said.

One use case highlighted by Cisco, for example, could help airline customers change flights in real-time by querying timing preferences, providing a range of flight options, and completing the call by making the booking. The agent uses AI technology to connect corporate information systems to customer queries.

The company also added new Cisco AI Assistant features to its Webex Contact Centers. That tool is an assistant for customer service agents that can make recommendations for answering customer queries.

The agent, originally rolled out in February, uses a number of tools to understand customer intent and then provides appropriate recommendations. The goal is to help human agents provide better responses.

For example, one new tool can allow accurate transcription of calls, making it easier to understand speakers with accents or unusual speech patterns. It can also provide context for complex discussions, along with real-time recommendations on actions or responses, Cisco said.

Some of the previously added tools can provide summaries on dropped calls or interactions with virtual agents before calls are transferred to human agents. Still other tools can measure customer satisfaction or pull information from past calls and topics to improve customer service experiences.

Cisco also announced it has integrated Apple’s AirPlay on Cisco Devices for Microsoft Teams Rooms, which enables “instant wireless content sharing from iPhone, iPad or Mac to Cisco Devices.”

Kategorie: Hacking & Security

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users' Actions

The Hacker News - 17 Březen, 2025 - 12:52
Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the layout of web pages, to bypass spam filters and track users' actions. That's according to new findings from Cisco Talos, which said such malicious activities can compromise a victim's security and privacy. "The features available in CSS allow attackers and spammers to track users' actions and
Kategorie: Hacking & Security

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users' Actions

The Hacker News - 17 Březen, 2025 - 12:52
Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the layout of web pages, to bypass spam filters and track users' actions. That's according to new findings from Cisco Talos, which said such malicious activities can compromise a victim's security and privacy. "The features available in CSS allow attackers and spammers to track users' actions and Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

The Hacker News - 17 Březen, 2025 - 12:25
From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a reminder that attackers are always evolving. Advanced threat groups are exploiting outdated hardware, abusing legitimate tools for financial fraud, and finding new ways to bypass security defenses. Meanwhile, supply chain threats are on the rise, with open-source
Kategorie: Hacking & Security

⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

The Hacker News - 17 Březen, 2025 - 12:25
From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a reminder that attackers are always evolving. Advanced threat groups are exploiting outdated hardware, abusing legitimate tools for financial fraud, and finding new ways to bypass security defenses. Meanwhile, supply chain threats are on the rise, with open-source Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Novinky v Androidu. Čas školy omezí funkce telefonu ve vyučování, u velkých updatů se dozvíte nejdůležitější novinky

Zive.cz - bezpečnost - 17 Březen, 2025 - 12:15
** Androidy každý měsíc dostávají aktualizaci systému Google ** Týká se funkcí navázaných na služby Google Play a obchod Play ** Přinášíme pravidelný přehled těch největších změn a novinek
Kategorie: Hacking & Security

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

The Hacker News - 17 Březen, 2025 - 12:00
The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in 66% of cloud storage buckets. This data is vulnerable to ransomware attacks. The SANS Institute recently reported that these attacks can be performed by abusing the cloud provider’s storage security controls and default settings. “In just the past few months, I have witnessed two different methods for
Kategorie: Hacking & Security

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

The Hacker News - 17 Březen, 2025 - 12:00
The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in 66% of cloud storage buckets. This data is vulnerable to ransomware attacks. The SANS Institute recently reported that these attacks can be performed by abusing the cloud provider’s storage security controls and default settings. “In just the past few months, I have witnessed two different methods [email protected]
Kategorie: Hacking & Security
Syndikovat obsah