This week's cybersecurity news highlights several critical vulnerabilities and attacks. One of the most significant is the exposure of nearly 3.7 million customer service records by Sears Home Services due to unprotected databases, which included personal details like names, addresses, phone numbers, and service appointment information. Another notable story involves nine vulnerabilities found in KVM devices from various vendors, including a severe flaw that allows remote execution without credentials. This vulnerability is particularly dangerous because it affects the BIOS level, allowing attackers to bypass OS-level security measures. Additionally, scammers used fake GitHub accounts to trick developers into connecting their wallets to a malicious site, and new malware named Speagle was discovered, leveraging legitimate security software to steal sensitive data. The ransomware group The Gentlemen has been using a critical FortiOS/FortiProxy flaw for network infiltration and encryption attacks.
- Sears Home Services AI chatbot databases
- GL-iNet KVM devices
- Angeet/Yeeso ES3 KVM device
- Sipeed KVM devices
- JetKVM
- Upgrade to the latest version of KVM software from JetKVM and Sipeed.
- Apply patches provided by vendors for GL-iNet, Angeet/Yeeso, and other affected KVM devices.
- Implement strict access controls on any exposed databases or repositories.
- Update all systems with critical security updates.
The impact on homelab stacks is significant due to the vulnerabilities in KVM devices and potential for BIOS-level attacks. Specific software like GL-iNet, Angeet/Yeeso ES3, Sipeed, and JetKVM may need to be updated or patched immediately.