β Whatβs Next for Ransomware in 2021? β
π Read
via "Threat Post".
Ransomware response demands a whole-of-business plan before the next attack, according to our roundtable of experts.π Read
via "Threat Post".
Threat Post
Whatβs Next for Ransomware in 2021?
Ransomware response demands a whole-of-business plan before the next attack, according to our roundtable of experts.
π΄ How to Build Cyber Resilience in a Dangerous Atmosphere π΄
π Read
via "Dark Reading".
Our polarized climate and COVID-19 are putting the nation's cybersecurity in imminent danger, and it's past time to act.π Read
via "Dark Reading".
Dark Reading
How to Build Cyber Resilience in a Dangerous Atmosphere
Our polarized climate and COVID-19 are putting the nation's cybersecurity in imminent danger, and it's past time to act.
π 50 Threat Intelligence Tools for Valuable Threat Insights π
π Read
via "Digital Guardian".
Threat analysis tools with updated intelligence feeds have become an essential part of defenders' toolkits. In this blog, we look at 50 threat intelligence tools that can help teams better protect their business.π Read
via "Digital Guardian".
Digital Guardian
50 Threat Intelligence Tools for Valuable Threat Insights
Threat analysis tools with updated intelligence feeds have become an essential part of defenders' toolkits. In this blog, we look at 50 threat intelligence tools that can help teams better protect their business.
β S3 Ep13: A chat with hacker Keren Elazari [Podcast] β
π Read
via "Naked Security".
Latest episode - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep13: A chat with hacker Keren Elazari [Podcast]
Latest episode β listen now!
π΄ Microsoft Reveals That Russian Attackers Accessed Some of Its Source Code π΄
π Read
via "Dark Reading".
Malicious SolarWinds Orion backdoor installed in Microsoft's network led to the attackers viewing some of its source code.π Read
via "Dark Reading".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
βΌ CVE-2019-25011 βΌ
π Read
via "National Vulnerability Database".
NetBox through 2.6.2 allows an Authenticated User to conduct an XSS attack against an admin via a GFM-rendered field, as demonstrated by /dcim/sites/add/ comments.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35930 βΌ
π Read
via "National Vulnerability Database".
Seo Panel 4.8.0 allows stored XSS by an Authenticated User via the url parameter, as demonstrated by the seo/seopanel/websites.php URI.π Read
via "National Vulnerability Database".
π¦Ώ SMBs: How to find the right MSP for your cybersecurity needs π¦Ώ
π Read
via "Tech Republic".
Cybercriminals do what they do for money, so why not make it unworthy of their time to attack your small or medium business?π Read
via "Tech Republic".
TechRepublic
SMBs: How to find the right MSP for your cybersecurity needs
Cybercriminals do what they do for money, so why not make it unworthy of their time to attack your small or medium business?
βΌ CVE-2020-35931 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Foxit Reader before 10.1.1 (and before 4.1.1 on macOS) and PhantomPDF before 9.7.5 and 10.x before 10.1.1 (and before 4.1.1 on macOS). An attacker can spoof a certified PDF document via an Evil Annotation Attack because the products fail to consider a null value for a Subtype entry of the Annotation dictionary, in an incremental update.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26165 βΌ
π Read
via "National Vulnerability Database".
qdPM through 9.1 allows PHP Object Injection via timeReportActions::executeExport in core/apps/qdPM/modules/timeReport/actions/actions.class.php because unserialize is used.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35951 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the Quiz and Survey Master plugin before 7.0.1 for WordPress. It allows users to delete arbitrary files such as wp-config.php file, which could effectively take a site offline and allow an attacker to reinstall with a WordPress instance under their control. This occurred via qsm_remove_file_fd_question, which allowed unauthenticated deletions (even though it was only intended for a person to delete their own quiz-answer files).π Read
via "National Vulnerability Database".
βΌ CVE-2020-35945 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the Divi Builder plugin, Divi theme, and Divi Extra theme before 4.5.3 for WordPress. Authenticated attackers, with contributor-level or above capabilities, can upload arbitrary files, including .php files. This occurs because the check for file extensions is on the client side.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35946 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the All in One SEO Pack plugin before 3.6.2 for WordPress. The SEO Description and Title fields are vulnerable to unsanitized input from a Contributor, leading to stored XSS.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35948 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.π Read
via "National Vulnerability Database".
βΌ CVE-2016-20004 βΌ
π Read
via "National Vulnerability Database".
The REST/JSON project 7.x-1.x for Drupal allows field access bypass, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35936 βΌ
π Read
via "National Vulnerability Database".
Stored Cross-Site Scripting (XSS) vulnerabilities in the Post Grid plugin before 2.0.73 for WordPress allow remote authenticated attackers to import layouts including JavaScript supplied via a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to post_grid_import_xml_layouts.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35937 βΌ
π Read
via "National Vulnerability Database".
Stored Cross-Site Scripting (XSS) vulnerabilities in the Team Showcase plugin before 1.22.16 for WordPress allow remote authenticated attackers to import layouts including JavaScript supplied via a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to team_import_xml_layouts.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35932 βΌ
π Read
via "National Vulnerability Database".
Insecure Deserialization in the Newsletter plugin before 6.8.2 for WordPress allows authenticated remote attackers with minimal privileges (such as subscribers) to use the tpnc_render AJAX action to inject arbitrary PHP objects via the options[inline_edits] parameter. NOTE: exploitability depends on PHP objects that might be present with certain other plugins or themes.π Read
via "National Vulnerability Database".
βΌ CVE-2019-25012 βΌ
π Read
via "National Vulnerability Database".
The Webform Report project 7.x-1.x-dev for Drupal allows remote attackers to view submissions by visiting the /rss.xml page. NOTE: This project is not covered by Drupal's security advisory policy.π Read
via "National Vulnerability Database".
βΌ CVE-2017-20001 βΌ
π Read
via "National Vulnerability Database".
The AES encryption project 7.x and 8.x for Drupal does not sufficiently prevent attackers from decrypting data, aka SA-CONTRIB-2017-027. NOTE: This project is not covered by Drupal's security advisory policy.π Read
via "National Vulnerability Database".
βΌ CVE-2016-20001 βΌ
π Read
via "National Vulnerability Database".
The REST/JSON project 7.x-1.x for Drupal allows node access bypass, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.π Read
via "National Vulnerability Database".