Options

Cybersecurity Weekly: Windows SMB Flaw, Intel vulnerability, mobile banking risk

Infosec_SamInfosec_Sam Admin Posts: 527 Admin

A new critical vulnerability affects Windows SMB protocol. Intel CPUs are vulnerable to new SGAxe and CrossTalk side-channel attacks. The FBI says a sudden increase in mobile banking is heightening risks for users. All this, and more, in this week’s edition of Cybersecurity Weekly.

 

1. A new critical vulnerability affects Windows SMB protocol

Last week, cybersecurity researchers uncovered a new critical vulnerability affecting the Server Message Block protocol that could allow attackers to leak kernel memory remotely, and when combined with a previously disclosed wormable bug, the flaw can be exploited to achieve remote code execution attacks.
Read more »

 

2. Intel CPUs vulnerable to new SGAxe and CrossTalk side-channel attacks

Cybersecurity researchers discovered two distinct attacks that could be exploited against modern Intel processors to leak sensitive information from the CPU's trusted execution environments. One of the flaws is an evolution of the previously uncovered CacheOut attack that allows an attacker to retrieve the contents from the CPU's L1 Cache.
Read more »

 

3. FBI says sudden increase in mobile banking is heightening risks for users

A recent surge in the use of mobile banking apps in the US prompted the FBI to warn smartphone users to be on the lookout for increased mobile malware and fake apps. In a recent public service announcement, the FBI’s ICCC indicated a 50% increase in mobile banking since the beginning of the year.
Read more »


For more cybersecurity news stories like these, check out the blog »

Looking for certification prep and technical skills development content? Visit our website to check out Infosec Skills! The platform has 70 learning paths, 600 courses and 150 virtual labs where you can try out new skills in a sandboxed environment. Try it free for 30 days with promo code: infoseccommunity

Try Infosec Skills »

Community Manager at Infosec!
Who we are | What we do
Sign In or Register to comment.