2310

'Delightful' Red Hat OpenShift AI bug allows full takeoverwww.theregister.com: Who wouldn't want root access on cluster master nodes?
A 9.9 out of 10 severity bug in Red Hat's OpenShift AI service could allow a remote attacker with minimal authentication to steal data, disrupt services, and fully hijack the platform.

"A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator," the IBM subsidiary warned in a security alert published earlier this week.

"This allows for the complete compromise of the cluster's confidentiality, integrity, and availability," the alert continues. "The attacker can steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total breach of the platform and all applications hosted on it."

Red Hat fesses up to GitLab breach after attackers bragwww.theregister.com: Open source giant admits intruders broke into dedicated consulting instance, but insists core products untouched
The group also claims to have hit downstream Red Hat customers – claims that have prompted Belgium's national cybersecurity authority to sound the alarm. In an advisory on Friday, it warned of a "high risk... potential supply chain impact" and urged Belgian organizations to revoke and rotate all tokens, keys, and credentials shared with Red Hat or used in integrations.

"At this time, we have no reason to believe the security issue impacts any of our other Red Hat services or products and are highly confident in the integrity of our software supply chain," Red Hat spokesperson Stephanie Wonderlick told The Register.

Red Hat is equally silent on whether the intrusion involved ransomware or extortion. Unlike groups such as Clop, which specialize in double-extortion leaks, Crimson Collective has yet to establish much of a track record beyond bluster. For now, Red Hat has carefully avoided mentioning demands, negotiations, or the e-word.
avatar
Zeroblog

« Tout homme porte sur l'épaule gauche un singe et, sur l'épaule droite, un perroquet. » — Jean Cocteau
« Moi je cherche plus de logique non plus. C'est surement pour cela que j'apprécie les Ataris, ils sont aussi logiques que moi ! » — GT Turbo

2311

https://www.tomshardware.com/tech-industry/cyber-security/china-says-it-has-foiled-a-series-u-s-cyberattacks-on-its-critical-infrastructure-ministry-of-state-security-says-it-has-irrefutable-evidence-nsa-tried-to-cause-international-time-chaos
China’s Ministry of State Security (MSS) has taken to social media to boast about foiling a series of cyberattacks it says were directed by the U.S. National Security Agency (NSA) (machine translation). Moreover, the MSS claims to have “irrefutable evidence” to back up its allegations.

According to the MSS WeChat post, the target of the NSA’s sustained series of attacks, dating back to 2022, was China’s National Time Service Center (NTSC).
avatar
Zeroblog

« Tout homme porte sur l'épaule gauche un singe et, sur l'épaule droite, un perroquet. » — Jean Cocteau
« Moi je cherche plus de logique non plus. C'est surement pour cela que j'apprécie les Ataris, ils sont aussi logiques que moi ! » — GT Turbo

2312

Même si je n'ai qu'une confiance assez modérée dans la parole chinoise (mais y a-t-il une parole officielle digne de foi en ce moment ?), ça reste largement plausible.
avatar
<<< Kernel Extremis©®™ >>> et Inventeur de la différence administratif/judiciaire ! (©Yoshi Noir)

<Vertyos> un poil plus mais elle suce bien quand même la mienne ^^
<Sabrina`> tinkiete flan c juste qu'ils sont jaloux que je te trouve aussi appétissant

2313

Oh, je ne sous-entends pas qu'il faut prendre ça pour argent comptant. Mais comme tu le dis, en soi c'est tout-à-fait plausible.
avatar
Zeroblog

« Tout homme porte sur l'épaule gauche un singe et, sur l'épaule droite, un perroquet. » — Jean Cocteau
« Moi je cherche plus de logique non plus. C'est surement pour cela que j'apprécie les Ataris, ils sont aussi logiques que moi ! » — GT Turbo

2314

CVE, CVSS scores need overhauling, argues Codific CEOwww.theregister.com: CVE and CVSS systems suffer from misaligned incentives and inconsistency
Aram Hovespyan, co-founder and CEO of security biz Codific, says that the rating systems for identifying security vulnerabilities and assessing threat risk need to be overhauled.

Having examined the CVE (Common Vulnerabilities and Exposures) vulnerability identification numbering system, Hovespyan argues that about a third of CVEs are meaningless.

His analysis cites academic research published in August as part of the USENIX Security Symposium. The paper, "Confusing Value with Enumeration: Studying the Use of CVEs in Academia," (Moritz Schloegel et al.), reports that 34 percent of 1,803 CVEs cited in research papers over the past five years either have not been publicly confirmed or have been disputed by maintainers of the supposedly vulnerable software projects. The authors argue that CVEs should not be taken as a proxy for the real-world impact of claimed vulnerabilities.
avatar
Zeroblog

« Tout homme porte sur l'épaule gauche un singe et, sur l'épaule droite, un perroquet. » — Jean Cocteau
« Moi je cherche plus de logique non plus. C'est surement pour cela que j'apprécie les Ataris, ils sont aussi logiques que moi ! » — GT Turbo