<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news March 2023</title>
	<atom:link href="http://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 26 Apr 2026 11:16:35 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: annaken</title>
		<link>https://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/comment-page-8/#comment-1840404</link>
		<dc:creator><![CDATA[annaken]]></dc:creator>
		<pubDate>Tue, 03 Dec 2024 14:50:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193354#comment-1840404</guid>
		<description><![CDATA[ChatGPT Español is an advanced AI conversational model designed to understand and generate text in Spanish. It enhances communication across various sectors, including customer service, education, and healthcare, providing instant, personalized support and engagement.]]></description>
		<content:encoded><![CDATA[<p>ChatGPT Español is an advanced AI conversational model designed to understand and generate text in Spanish. It enhances communication across various sectors, including customer service, education, and healthcare, providing instant, personalized support and engagement.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: chatgptjapan</title>
		<link>https://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/comment-page-8/#comment-1839704</link>
		<dc:creator><![CDATA[chatgptjapan]]></dc:creator>
		<pubDate>Mon, 25 Nov 2024 07:42:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193354#comment-1839704</guid>
		<description><![CDATA[Chat GPT Japanese is an advanced AI chatbot developed by OpenAI with Japanese language support. It enables smooth communication in Japanese and can be used for a wide range of applications including question answering, information provision, and daily conversation. It responds quickly to any questions.]]></description>
		<content:encoded><![CDATA[<p>Chat GPT Japanese is an advanced AI chatbot developed by OpenAI with Japanese language support. It enables smooth communication in Japanese and can be used for a wide range of applications including question answering, information provision, and daily conversation. It responds quickly to any questions.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: GPTJP.net</title>
		<link>https://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/comment-page-8/#comment-1835520</link>
		<dc:creator><![CDATA[GPTJP.net]]></dc:creator>
		<pubDate>Wed, 11 Sep 2024 07:12:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193354#comment-1835520</guid>
		<description><![CDATA[However, it could benefit from more actionable insights for businesses. For readers interested in leveraging AI tools like ChatGPT, consider exploring free access options at https://gptjp.net/ to enhance your cybersecurity strategy and decision-making processes.]]></description>
		<content:encoded><![CDATA[<p>However, it could benefit from more actionable insights for businesses. For readers interested in leveraging AI tools like ChatGPT, consider exploring free access options at <a href="https://gptjp.net/" rel="nofollow">https://gptjp.net/</a> to enhance your cybersecurity strategy and decision-making processes.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: GPTJP.net</title>
		<link>https://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/comment-page-8/#comment-1835519</link>
		<dc:creator><![CDATA[GPTJP.net]]></dc:creator>
		<pubDate>Wed, 11 Sep 2024 07:11:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193354#comment-1835519</guid>
		<description><![CDATA[This article on cyber security trends for March 2023 is a thorough roundup of the latest developments. However, it could benefit from more actionable insights for businesses. For readers interested in leveraging AI tools like ChatGPT, consider exploring free access options at GPTJP.net to enhance your cybersecurity strategy and decision-making processes.]]></description>
		<content:encoded><![CDATA[<p>This article on cyber security trends for March 2023 is a thorough roundup of the latest developments. However, it could benefit from more actionable insights for businesses. For readers interested in leveraging AI tools like ChatGPT, consider exploring free access options at GPTJP.net to enhance your cybersecurity strategy and decision-making processes.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Lewis</title>
		<link>https://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/comment-page-8/#comment-1815692</link>
		<dc:creator><![CDATA[Lewis]]></dc:creator>
		<pubDate>Mon, 16 Oct 2023 11:22:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193354#comment-1815692</guid>
		<description><![CDATA[To be honest, I have owned my business for a long time, and recently the number of orders has grown very quickly. so I decided to use this source &lt;a href=&quot;https://gosoftwarebuy.com/product-category/office&quot; rel=&quot;nofollow&quot;&gt;https://gosoftwarebuy.com/product-category/office&lt;/a&gt; . It has helped my company to manage the order load and we delivered everything on time. I suggest you try it.]]></description>
		<content:encoded><![CDATA[<p>To be honest, I have owned my business for a long time, and recently the number of orders has grown very quickly. so I decided to use this source <a href="https://gosoftwarebuy.com/product-category/office" rel="nofollow">https://gosoftwarebuy.com/product-category/office</a> . It has helped my company to manage the order load and we delivered everything on time. I suggest you try it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/comment-page-8/#comment-1799797</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Apr 2023 13:29:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193354#comment-1799797</guid>
		<description><![CDATA[https://hackaday.com/2023/03/24/this-week-in-security-usb-boom-acropalypse-and-a-bitcoin-heist/

Patch To Pwn

How long does it take to deconstruct a patch, figure out the vulnerability, and turn it into a working proof of concept? A whole bunch of hardening has gone into our operating systems in the last few years to try to keep the reverse engineering window far enough ahead of the patch application curve. But ocassionally, the turnaround still manages to clock in at about a day.

CVE-2023-21768 is a vulnerability in the Ancillary Function Driver, part of the Winsock API. The patch modifies kernel code, and it took some work for researchers at SecurityIntelligence to understand how to trigger the flaw from userspace. It’s an unchecked memory write, to a pointer supplied by userspace. The steps to set up the write were a bit complicated, but not insurmountable. This particular group of researchers opted to use a Windows I/O ring to map kernel memory into userspace, gaining a read/write primitive. And that’s pretty much game over for an exploit. Interestingly, another group of researchers found this same vulnerability being exploited in-the-wild in January, likely very shortly after the patch was released by Microsoft.

Patch Tuesday -&gt; Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours
https://securityintelligence.com/posts/patch-tuesday-exploit-wednesday-pwning-windows-ancillary-function-driver-winsock/

‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.

However, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can be introduced. By honing in on this newly introduced code, we demonstrate that vulnerabilities that can be trivially weaponized still occur frequently. In this blog post, we analyze and exploit a vulnerability in the Windows Ancillary Function Driver for Winsock, afd.sys, for Local Privilege Escalation (LPE) on Windows 11. Though neither of us had any previous experience with this kernel module, we were able to diagnose, reproduce, and weaponize the vulnerability in about a day. You can find the exploit code here.

Patch Diff and Root Cause Analysis

Based on the details of CVE-2023-21768 published by the Microsoft Security Response Center (MSRC), the vulnerability exists within the Ancillary Function Driver (AFD), whose binary filename is afd.sys. The AFD module is the kernel entry point for the Winsock API.]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2023/03/24/this-week-in-security-usb-boom-acropalypse-and-a-bitcoin-heist/" rel="nofollow">https://hackaday.com/2023/03/24/this-week-in-security-usb-boom-acropalypse-and-a-bitcoin-heist/</a></p>
<p>Patch To Pwn</p>
<p>How long does it take to deconstruct a patch, figure out the vulnerability, and turn it into a working proof of concept? A whole bunch of hardening has gone into our operating systems in the last few years to try to keep the reverse engineering window far enough ahead of the patch application curve. But ocassionally, the turnaround still manages to clock in at about a day.</p>
<p>CVE-2023-21768 is a vulnerability in the Ancillary Function Driver, part of the Winsock API. The patch modifies kernel code, and it took some work for researchers at SecurityIntelligence to understand how to trigger the flaw from userspace. It’s an unchecked memory write, to a pointer supplied by userspace. The steps to set up the write were a bit complicated, but not insurmountable. This particular group of researchers opted to use a Windows I/O ring to map kernel memory into userspace, gaining a read/write primitive. And that’s pretty much game over for an exploit. Interestingly, another group of researchers found this same vulnerability being exploited in-the-wild in January, likely very shortly after the patch was released by Microsoft.</p>
<p>Patch Tuesday -&gt; Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours<br />
<a href="https://securityintelligence.com/posts/patch-tuesday-exploit-wednesday-pwning-windows-ancillary-function-driver-winsock/" rel="nofollow">https://securityintelligence.com/posts/patch-tuesday-exploit-wednesday-pwning-windows-ancillary-function-driver-winsock/</a></p>
<p>‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.</p>
<p>However, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can be introduced. By honing in on this newly introduced code, we demonstrate that vulnerabilities that can be trivially weaponized still occur frequently. In this blog post, we analyze and exploit a vulnerability in the Windows Ancillary Function Driver for Winsock, afd.sys, for Local Privilege Escalation (LPE) on Windows 11. Though neither of us had any previous experience with this kernel module, we were able to diagnose, reproduce, and weaponize the vulnerability in about a day. You can find the exploit code here.</p>
<p>Patch Diff and Root Cause Analysis</p>
<p>Based on the details of CVE-2023-21768 published by the Microsoft Security Response Center (MSRC), the vulnerability exists within the Ancillary Function Driver (AFD), whose binary filename is afd.sys. The AFD module is the kernel entry point for the Winsock API.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/comment-page-8/#comment-1799622</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Apr 2023 10:40:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193354#comment-1799622</guid>
		<description><![CDATA[Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs
https://www.bleepingcomputer.com/news/security/hackers-exploit-bug-in-elementor-pro-wordpress-plugin-with-11m-installs/

Hackers are actively exploiting a high-severity vulnerability in the popular Elementor Pro WordPress plugin used by over eleven million websites.

Elementor Pro is a WordPress page builder plugin allowing users to easily build professional-looking sites without knowing how to code, featuring drag and drop, theme building, a template collection, custom widget support, and a WooCommerce builder for online shops.]]></description>
		<content:encoded><![CDATA[<p>Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs<br />
<a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-bug-in-elementor-pro-wordpress-plugin-with-11m-installs/" rel="nofollow">https://www.bleepingcomputer.com/news/security/hackers-exploit-bug-in-elementor-pro-wordpress-plugin-with-11m-installs/</a></p>
<p>Hackers are actively exploiting a high-severity vulnerability in the popular Elementor Pro WordPress plugin used by over eleven million websites.</p>
<p>Elementor Pro is a WordPress page builder plugin allowing users to easily build professional-looking sites without knowing how to code, featuring drag and drop, theme building, a template collection, custom widget support, and a WooCommerce builder for online shops.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/comment-page-8/#comment-1799601</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Apr 2023 06:27:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193354#comment-1799601</guid>
		<description><![CDATA[&quot;Hackers exploit WordPress plugin flaw that gives full control of millions of sites&quot;

Hackers exploit WordPress plugin flaw that gives full control of millions of sites
Elementor Pro fixed the vulnerability, but not everyone has installed the patch.
https://arstechnica.com/information-technology/2023/03/hackers-exploit-wordpress-plugin-flaw-that-gives-full-control-of-millions-of-sites/

Hackers are actively exploiting a critical vulnerability in a widely used WordPress plugin that gives them the ability to take complete control of millions of sites, researchers said.

The vulnerability, which carries a severity rating of 8.8 out of a possible 10, is present in Elementor Pro, a premium plugin running on more than 12 million sites powered by the WordPress content management system. Elementor Pro allows users to create high-quality websites using a wide range of tools, one of which is WooCommerce, a separate WordPress plugin. When those conditions are met, anyone with an account on the site—say a subscriber or customer—can create new accounts that have full administrator privileges.

The vulnerability was discovered by Jerome Bruandet, a researcher with security firm NinTechNet. Last week, Elementor, the developer of the Elementor Pro plugin, released version 3.11.7, which patched the flaw.]]></description>
		<content:encoded><![CDATA[<p>&#8220;Hackers exploit WordPress plugin flaw that gives full control of millions of sites&#8221;</p>
<p>Hackers exploit WordPress plugin flaw that gives full control of millions of sites<br />
Elementor Pro fixed the vulnerability, but not everyone has installed the patch.<br />
<a href="https://arstechnica.com/information-technology/2023/03/hackers-exploit-wordpress-plugin-flaw-that-gives-full-control-of-millions-of-sites/" rel="nofollow">https://arstechnica.com/information-technology/2023/03/hackers-exploit-wordpress-plugin-flaw-that-gives-full-control-of-millions-of-sites/</a></p>
<p>Hackers are actively exploiting a critical vulnerability in a widely used WordPress plugin that gives them the ability to take complete control of millions of sites, researchers said.</p>
<p>The vulnerability, which carries a severity rating of 8.8 out of a possible 10, is present in Elementor Pro, a premium plugin running on more than 12 million sites powered by the WordPress content management system. Elementor Pro allows users to create high-quality websites using a wide range of tools, one of which is WooCommerce, a separate WordPress plugin. When those conditions are met, anyone with an account on the site—say a subscriber or customer—can create new accounts that have full administrator privileges.</p>
<p>The vulnerability was discovered by Jerome Bruandet, a researcher with security firm NinTechNet. Last week, Elementor, the developer of the Elementor Pro plugin, released version 3.11.7, which patched the flaw.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/comment-page-8/#comment-1799581</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Mar 2023 18:33:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193354#comment-1799581</guid>
		<description><![CDATA[Huijarit keksivät teksti­viesteihin uuden koukun – älä missään nimessä klikkaa
Ainakin Danske Bankin nimissä lähetettävissä tekstiviesteissä pelotellaan Apple Payn kytkemisellä korttiin.
https://www.is.fi/digitoday/tietoturva/art-2000009466540.html]]></description>
		<content:encoded><![CDATA[<p>Huijarit keksivät teksti­viesteihin uuden koukun – älä missään nimessä klikkaa<br />
Ainakin Danske Bankin nimissä lähetettävissä tekstiviesteissä pelotellaan Apple Payn kytkemisellä korttiin.<br />
<a href="https://www.is.fi/digitoday/tietoturva/art-2000009466540.html" rel="nofollow">https://www.is.fi/digitoday/tietoturva/art-2000009466540.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/03/01/cyber-security-news-march-2023/comment-page-8/#comment-1799572</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Mar 2023 18:20:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193354#comment-1799572</guid>
		<description><![CDATA[Ransomware crooks are exploiting IBM file-exchange bug with a 9.8 severity
If you haven&#039;t patched your Aspera Faspex server, now would be an excellent time.
https://arstechnica.com/information-technology/2023/03/ransomware-crooks-are-exploiting-ibm-file-exchange-bug-with-a-9-8-severity/

Threat actors are exploiting a critical vulnerability in an IBM file-exchange application in hacks that install ransomware on servers, security researchers have warned.

The IBM Aspera Faspex is a centralized file-exchange application that large organizations use to transfer large files or large volumes of files at very high speeds. Rather than relying on TCP-based technologies such as FTP to move files, Aspera uses IBM’s proprietary FASP—short for Fast, Adaptive, and Secure Protocol—to better utilize available network bandwidth. The product also provides fine-grained management that makes it easy for users to send files to a list of recipients in distribution lists or shared inboxes or workgroups, giving transfers a workflow that’s similar to email.

In late January, IBM warned of a critical vulnerability in Aspera versions 4.4.2 Patch Level 1 and earlier and urged users to install an update to patch the flaw. Tracked as CVE-2022-47986, the vulnerability makes it possible for unauthenticated threat actors to remotely execute malicious code by sending specially crafted calls to an outdated programming interface. The ease of exploiting the vulnerability and the damage that could result earned CVE-2022-47986 a severity rating of 9.8 out of a possible 10.]]></description>
		<content:encoded><![CDATA[<p>Ransomware crooks are exploiting IBM file-exchange bug with a 9.8 severity<br />
If you haven&#8217;t patched your Aspera Faspex server, now would be an excellent time.<br />
<a href="https://arstechnica.com/information-technology/2023/03/ransomware-crooks-are-exploiting-ibm-file-exchange-bug-with-a-9-8-severity/" rel="nofollow">https://arstechnica.com/information-technology/2023/03/ransomware-crooks-are-exploiting-ibm-file-exchange-bug-with-a-9-8-severity/</a></p>
<p>Threat actors are exploiting a critical vulnerability in an IBM file-exchange application in hacks that install ransomware on servers, security researchers have warned.</p>
<p>The IBM Aspera Faspex is a centralized file-exchange application that large organizations use to transfer large files or large volumes of files at very high speeds. Rather than relying on TCP-based technologies such as FTP to move files, Aspera uses IBM’s proprietary FASP—short for Fast, Adaptive, and Secure Protocol—to better utilize available network bandwidth. The product also provides fine-grained management that makes it easy for users to send files to a list of recipients in distribution lists or shared inboxes or workgroups, giving transfers a workflow that’s similar to email.</p>
<p>In late January, IBM warned of a critical vulnerability in Aspera versions 4.4.2 Patch Level 1 and earlier and urged users to install an update to patch the flaw. Tracked as CVE-2022-47986, the vulnerability makes it possible for unauthenticated threat actors to remotely execute malicious code by sending specially crafted calls to an outdated programming interface. The ease of exploiting the vulnerability and the damage that could result earned CVE-2022-47986 a severity rating of 9.8 out of a possible 10.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
