❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

New Windows Flaw Lets Attackers Bypass Mark of the Web

20 January 2026 at 09:45

Microsoft patched a Windows Remote Assistance flaw that lets attackers bypass Mark of the Web, weakening protections against malicious downloads and phishing files.

The post New Windows Flaw Lets Attackers Bypass Mark of the Web appeared first on TechRepublic.

New Windows Flaw Lets Attackers Bypass Mark of the Web

20 January 2026 at 09:45

Microsoft patched a Windows Remote Assistance flaw that lets attackers bypass Mark of the Web, weakening protections against malicious downloads and phishing files.

The post New Windows Flaw Lets Attackers Bypass Mark of the Web appeared first on TechRepublic.

JFrog Researchers Uncover RCE Exploit for Existing Redis Database Vulnerability

17 January 2026 at 10:25
vulnerability, patch, Cisco, flaw, patch, vulnerabilities, Cato, patch, automation, patch management, Action1 patching cyberattacks JumpCloud patching

JFrog this week published an analysis of a vulnerability in Redis databases that may be more serious than initially thought following the discovery of a remote code execution (RCE) exploit. Researchers found that a stack buffer overflow vulnerability in Redis (CVE-2025-62507) can be used to run the XACKDEL command with multiple IDs to trigger a..

The post JFrog Researchers Uncover RCE Exploit for Existing Redis Database Vulnerability appeared first on Security Boulevard.

Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes

5 January 2026 at 07:01

WhatsApp device fingerprinting can be useful in the delivery of sophisticated spyware, but impact is very limited without a zero-day.

The post Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes appeared first on SecurityWeek.

5 Best Strains for Superior Socializing

11 December 2025 at 15:59

Opening a jar of Super Lemon Haze, I’m hit with an overwhelming wave of citrus aroma. The crystal covered buds smell like a lemonade stand: sweet, sticky and a little bit tart. When I take the first inhalation, the taste reminds me of lemon meringue pie, so light and sweet, but with the unmistakable flavor of lemons. A few seconds later, a smile spreads across my face. I feel uplifted, energized and ready for conversation. Time to go socialize!

Cannabis can sometimes have a bad reputation when it comes to socializing. Since some strains make people feel sleepy, anxious or anti-social, many avoid using marijuana in social contexts. Fortunately, cannabis is an incredibly varied plant with many different effects. While certain strains may have you hiding in the corner rather than talking to friends, others are the ideal party companion, leaving you relaxed, energized and talkative. These differences have everything to do with the terpene and cannabinoid profile of the plant. Some profiles promote social tendencies while others increase anxiety, or leave you too tired to talk. The trick is finding the strains that promote your prosocial tendencies. Here are our top picks for social strains:

Super Lemon Haze

This sweet and sour sativa, described above, has a zippy, energetic high that’s a favorite among sativa smokers. The citrusy taste isn’t just a delicious flavor, it also indicates a terpene profile rich in limonene. This terpene is known for its relaxing, energizing and uplifting effects. If cannabis makes you sleepy, try sativas rich in limonene for a high that won’t put you to sleep.

Hawaiian

Another popular sativa strain for socializing is Hawaiian. Its strong topical aroma has notes of pineapple, guava and passionfruit and will leave you feeling like you just stepped onto a tropical island. The flavor is light and sweet with hints of fruit, but the real vacation is the happy and relaxed high that comes from these beautiful buds. With a perfect blend of terpenes like limonene, pinene (which aids focus and alertness) and myrcene (which has calming effects), this strain has been described as euphoric, talkative and giggly. Hawaiian is likely to leave your whole party smiling.

ACDC

ACDC is a woody, earthy sativa, with notes of pine. This clear-minded social strain is known for its 20:1 CBD:THC ratio and its relaxed, focused effects. Most strains have relatively high levels of THC, which often causes increased anxiety. If you find yourself to be more anxious after smoking a THC-heavy strain, try a sativa like ACDC that’s rich in CBD, as CBD counteracts this anxiety β€” leaving you relaxed and ready to mingle.

Cabbage Patch

Cabbage Patch is a sweet but tart sativa-dominant hybrid. This tasty flower is rich in THCV, a cannabinoid that can help side-step heightened anxiety from THC. While THCV offers all the energizing and euphoric effects of THC, it also relaxes users and is less likely to cause anxiety and paranoia. Cabbage Patch leaves users feeling relaxed, giggly, and energetic, which is the perfect mix for any party.

Afgoo

For those who prefer the high from indicas, Afgoo is an amazing choice when you want to get social. These sweet and slightly earthy flowers have notes of pine and berry. With high levels of myrcene, Afgoo is exceptionally relaxing and always leaves me feeling happy, warm and loving. It’s an exceptional strain for spending time with loved ones.

Originally published in the print edition of Cannabis Now. LEARN MORE

TELL US, what are your favorite strains to smoke when socializing?

The post 5 Best Strains for Superior Socializing appeared first on Cannabis Now.

What’s Old Is New, What’s New Is Old: Aged Vulnerabilities Still in Use in Attacks Today

26 February 2020 at 06:05

As reported in the IBM X-Force Threat Intelligence Index 2020, X-Force research teams operate a network of globally distributed spam honeypots, collecting and analyzing billions of unsolicited email items every year. Analysis of data from our spam traps reveals trending tactics that attackers are utilizing in malicious emails, specifically, that threat actors are continuing to target organizations through the exploitation of older Microsoft Word vulnerabilities (CVE-2017-0199 and CVE-2017-11882).

  • CVE-2017-0199 was first disclosed and patched in April 2017. It allows an attacker to download and execute a Visual Basic Script containing PowerShell commands after the victim opens a malicious document containing an embedded exploit. Unlike many other Microsoft Word and WordPad exploits, the victim does not need to enable macros or accept any prompts β€” the document just loads and executes a malicious file of the attacker’s choosing.
  • CVE-2017-11882 was first disclosed and patched in November 2017. This vulnerability involves a stack buffer overflow in the Microsoft Equation Editor component of Microsoft Office that allows for remote code execution. Interestingly, the vulnerable component was 17 years old (compiled in 2000) at the time of exploitation and unchanged since its removal in 2018.

These vulnerabilities, which were reported and subsequently issued patches in 2017, are the most frequently used of the top eight vulnerabilities observed in 2019. They were used in nearly 90 percent of malspam messages despite being well-publicized and dated. These findings highlight how delays in patching allow cybercriminals to continue to use old vulnerabilities and still see some success in their attacks.

2 Years and Still Going Strong

In addition to these vulnerabilities’ popularity in malspam, the volume of 2019 network attacks that targeted X-Force-monitored customers while attempting to exploit them was 25 times higher than the combined number of network attacks attempting to exploit similar vulnerabilities that leverage Object Linking and Embedding (OLE).

Our analysts did not observe a commonality regarding the malicious payloads used post-exploitation, which means that using these vulnerabilities is the choice of a wide array of threat actors and not specific to a small number of campaigns or adversarial groups.

Figure 1: Observed usage of top CVEs in 2019 spam emails (Source: IBM X-Force)

Another noteworthy insight from the figure above is that most vulnerabilities commonly used by cybercriminals are older ones. None of the vulnerabilities leveraged in 2019 were disclosed last year and only one was disclosed in 2018. The rest go back as far as 2003, further driving home the point that when it comes to malicious cyber activity, what’s old is new and what’s new is old.

The Allure of Older Vulnerabilities

Why would a wide array of threat actors use the same two old and well-known exploits in so many of their attacks? There are a few possible explanations, but the essence of it is they are cheaper, better documented, battle-tested and more likely to lead to legacy systems that are no longer being patched.

First, the exploits are very convenient for an attacker to use in that they don’t require user interaction. Unlike more recent Word vulnerabilities, which require the attacker to convince the user to enable macros, the exploits for these particular vulnerabilities automatically execute when the document is opened. This can help reduce the chance of arousing user suspicions and, accordingly, increase the rate of success.

Second, since so many different actors use these vulnerabilities, it can complicate attribution, as their widespread usage makes associating them with any particular individual or group difficult.

For example, IBM researchers recently observed threat actors leveraging these CVEs and using a variant of the X-Agent malware, which was historically associated with a threat actor known to IBM as ITG05 (also known as APT28). That threat group has been attributed to Russia’s Main Intelligence Directorate. But while they were being used by highly sophisticated threat actors, these vulnerabilities were also leveraged by low-end spammers dropping commodity malware through massive email campaigns.

The reuse of common exploits is a convenient way to muddy threat actor attribution, especially for groups that wish to remain anonymous in their operations. It can allow threat actors to hide among a large volume of activity, obfuscating their actions.

The third and perhaps most likely reason for the continued use of these vulnerabilities is the simple ease and convenience of generating documents that can exploit them. Because these types of documents are essential to the day-to-day operations of many target organizations, they are often not blocked by enterprise email filters. As a final bonus to threat actors, they are also some of the cheapest exploits cybercriminals can buy.

X-Force’s dark web research of underground forums highlights multiple offerings of free document builders that leverage each of these vulnerabilities. Our team also identified free YouTube videos focused on each vulnerability, illustrating how an attacker can generate a document to exploit these issues.

Figure 2: YouTube videos detailing how to generate documents exploiting CVEs 2017-0199, 2017-11882 (Source: IBM X-Force)

One should keep in mind that successful exploitation of older vulnerabilities is more likely to happen on older, unpatched operating systems (OSs) and legacy systems where OS end-of-life means that no new patches are even available. These kinds of systems are most likely used by organizations that can’t patch due to other issues or priorities. While there are many reasons that can contribute to the decision to defer patching, that decision is never a good one in the long run.

What Can Companies Do With This Sort of Information?

Older vulnerabilities are clearly not going away any time soon, so organizations need to be prepared to defend against their attempted exploitation. IBM X-Force Incident Response and Intelligence Services (IRIS) has the following tips for organizations to better protect themselves:

  • Asset management is an ongoing process that should be top of mind for risk management. Part of this process is continually assessing risk to critical systems and considering the consequences of not patching them. Reassess the risks and consider patching and updating operating systems as soon as possible. Reality check: Windows 7’s end-of-life took place on January 14, 2020. Is your organization ready to move to an updated OS?
  • On the application level, ensure that patches for productivity suites β€” especially Microsoft software β€” are applied as soon as they become available.
  • Monitor the organization’s environment for PowerShell callouts that may be attempting to download and execute malicious payloads.
  • Continue user education on the risks of opening attachments from unknown sources, as vulnerabilities like these do not require any user interaction beyond opening to cause harm.
  • Scope and engage in a vulnerability management program to determine if older vulnerabilities are exposing your environment to exploitation by an attacker.

Download the latest X-Force Threat Intelligence Index

The post What’s Old Is New, What’s New Is Old: Aged Vulnerabilities Still in Use in Attacks Today appeared first on Security Intelligence.

❌
❌