Skip to content

bentoboxinfosec

many parts make the whole

  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Home
  • 2024

Year: 2024

NINTH TELECOM COMPANY ADDED TO LIST OF Salt Typhoon TARGETS

Posted on December 28, 2024January 20, 2025 By topbento
Breach, News

A Chinese state-sponsored espionage campaign being dubbed Salt Typhoon now includes nine U.S telecommunication firms. The Chinese government has denied responsibility for the attack which has compromised communications of senior U.S government officials. The full scope of the attack may never be known as the sophisticated attackers took steps to erase evidence of their presence. … Read More “NINTH TELECOM COMPANY ADDED TO LIST OF Salt Typhoon TARGETS” »

McDonald’s API EXPLOITED FOR ONE CENT DELIVERIES

Posted on December 20, 2024January 20, 2025 By topbento
News

A flaw in McDonald’s McDelivery system in India could have allowed for the ability to order any number of menu items for $0.01. Sensitive information in the form of invoices for any order and the personal details for the delivery driver could also have been disclosed. This serves as a great reminder that while apps … Read More “McDonald’s API EXPLOITED FOR ONE CENT DELIVERIES” »

BRUTE-FORCE ATTACKS TARGETING Citrix NetScaler UNDERWAY

Posted on December 14, 2024January 20, 2025 By topbento
News, Vulnerability

There has been a surge in brute-force attacks targeting Citrix NetScaler. The attacks are mainly originating from a cloud provider based in Hong-Kong, their IP ranges are available in the article linked below and should be blocked to help mitigate the attack on vulnerable systems. The attacks are leveraging zero-day exploits that were recently addressed … Read More “BRUTE-FORCE ATTACKS TARGETING Citrix NetScaler UNDERWAY” »

AMD TRUSTED COMPUTING VULNERABLE TO NEW BadRAM ATTACK

Posted on December 11, 2024January 20, 2025 By topbento
News, Vulnerability

A new proof-of-concept attack has been disclosed by a team of researchers that effects AMD’s trusted execution environment. The attack does require physical access to the system however as the article below notes, in the age of cloud computing organizations may not have complete control over who has access to the physical hardware running their … Read More “AMD TRUSTED COMPUTING VULNERABLE TO NEW BadRAM ATTACK” »

ZERO-DAY ATTACK EFFECTING macOS SYSTEMS

Posted on November 20, 2024January 20, 2025 By topbento
News, Vulnerability

Apple has confirmed a zero-day attack is currently underway targeting macOS devices running Intel CPUs. Apple’s security response team has declined to provide any Indications of Compromise (IOCs) to help identify effected systems. There is confirmation the vulnerabilities are already being exploited in the wild. Updates to macOS are available and should be applied immediately … Read More “ZERO-DAY ATTACK EFFECTING macOS SYSTEMS” »

VULNERABILITIES FOUND IN ALL Nvidia GeForce GPUS

Posted on October 30, 2024January 20, 2025 By topbento
News, Vulnerability

Vulnerabilities have been discovered/disclosed in ALL Nvidia GeForce GPUs requiring a driver update that is currently available. The vulnerabilities potentially allow a threat actor to gain full control of a compromised system so be sure to update ASAP if you have an Nvidia GPU! Updated drivers can be found here More reading here and here! … Read More “VULNERABILITIES FOUND IN ALL Nvidia GeForce GPUS” »

Windows XP BECOMES INFECTED IN LESS THAN 10 MINUTES IN 2024

Posted on May 19, 2024September 19, 2024 By topbento
News

PC Gamer has a good article on how long an unprotected Windows XP machine can last on the internet before becoming hopelessly compromised and infected with malware. According to their findings the machine will become infected in less than 10 minutes simply by being connected to the internet, no action from the user required! If … Read More “Windows XP BECOMES INFECTED IN LESS THAN 10 MINUTES IN 2024” »

LINUX KERNEL SUPPLIER-SIDE OpenSSH BACKDOOR

Posted on May 17, 2024September 19, 2024 By topbento
Malware, News

There is a very interesting writeup at ars technica on a sophisticated malware attack that allowed bad actors to compromise infrastructure that was used to update and distribute Linux. The attack took place back in 2011 which led to 448 accounts being compromised and created a backdoor in OpenSSH that allowed for access to a … Read More “LINUX KERNEL SUPPLIER-SIDE OpenSSH BACKDOOR” »

BREACH AT Dell LEADS TO DATA OF 50 MILLION CUSTOMERS

Posted on May 15, 2024September 19, 2024 By topbento
Breach, News

A threat actor has revealed they were able to steal the data of 50 million Dell customers including names, addresses and other data related to purchases made at Dell. The compromise was accomplished by setting up a number of partner accounts within the Dell company portal which, after they were approved, allowed them to brute … Read More “BREACH AT Dell LEADS TO DATA OF 50 MILLION CUSTOMERS” »

NOVEL VPN ATTACK FORCES TRAFFIC OUTSIDE OF ENCRYPTED TUNNEL

Posted on May 8, 2024September 19, 2024 By topbento
News, Vulnerability

A novel VPN attack being called TunnelVision is able to force encrypted VPN traffic to route outside of the secure tunnel, potentially allowing a bad actor to intercept communication thought to be encrypted and secure. According to researchers the vulnerability may have existed since as early as 2002. The attack does not appear to effect … Read More “NOVEL VPN ATTACK FORCES TRAFFIC OUTSIDE OF ENCRYPTED TUNNEL” »

Posts navigation

1 2 Next

Recent Posts

  • Salt Typhoon THREAT ACTORS SPOTTED ON US GOVT NETWORKS BEFORE TELCOS
  • Charter and Windstream ADDED TO LIST OF TELCO PROVIDERS COMPROMISED BY Salt Typhoon
  • Cisco CONFIRMS AUTHENTICITY OF 4.45 GB DATA BREACH
  • NINTH TELECOM COMPANY ADDED TO LIST OF Salt Typhoon TARGETS
  • McDonald’s API EXPLOITED FOR ONE CENT DELIVERIES

Recent Comments

No comments to show.

Archives

  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • May 2024
  • April 2024
  • March 2024
  • September 2023
  • August 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • August 2022
  • July 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021
  • August 2021
  • July 2021
  • January 2021
  • December 2020
  • August 2020
  • May 2020
  • March 2020
  • February 2020
  • October 2019
  • June 2019
  • April 2019

Categories

  • Breach
  • Cloud
  • Conferences
  • Hardware Hacking
  • Malware
  • News
  • Ransomware
  • Tools
  • Tutorial
  • Uncategorized
  • Vulnerability
  • Walkthough
  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Twitter
  • Github
  • YouTube

Copyright © 2025 bentoboxinfosec.

Theme: Oceanly News Dark by ScriptsTown