πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  OpenStego Free Steganography Solution 0.8.0 πŸ› 

OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images).

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2020-29450 β€Ό

Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the avatar upload feature. The affected versions are before version 7.2.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20619 β€Ό

Cross-site scripting vulnerability in GROWI (v4.2 Series) versions prior to v4.2.3 allows remote attackers to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28478 β€Ό

This affects the package gsap before 3.6.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28477 β€Ό

This affects all versions of package immer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28472 β€Ό

This affects the package @aws-sdk/shared-ini-file-loader before 1.0.0-rc.9; the package aws-sdk before 2.814.0. If an attacker submits a malicious INI file to an application that parses it with loadSharedConfigFiles , they will pollute the prototype on the application. This can be exploited further depending on the context.

πŸ“– Read

via "National Vulnerability Database".
❌ Attackers Steal E-Mails, Info from OpenWrt Forum ❌

Users of the Linux-based open-source firmwareβ€”which include developers from commercial router companies--may be targeted by phishing campaigns, administrators warn.

πŸ“– Read

via "Threat Post".
πŸ›  Falco 0.27.0 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ A Security Practitioner's Guide to Encrypted DNS πŸ•΄

Best practices for a shifting visibility landscape.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-23522 β€Ό

Pixelimity 1.0 has cross-site request forgery via the admin/setting.php data [Password] parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23342 β€Ό

A CSRF vulnerability exists in Anchor CMS 0.12.7 anchor/views/users/edit.php that can change the Delete admin users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20950 β€Ό

Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in Microchip Libraries for Applications 2018-11-26 All up to 2018-11-26. The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35128 β€Ό

Mautic before 3.2.4 is affected by stored XSS. An attacker with permission to manage companies, an application feature, could attack other users, including administrators. For example, by loading an externally crafted JavaScript file, an attacker could eventually perform actions as the target user. These actions include changing the user passwords, altering user or email addresses, or adding a new administrator to the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35129 β€Ό

Mautic before 3.2.4 is affected by stored XSS. An attacker with access to Social Monitoring, an application feature, could attack other users, including administrators. For example, an attacker could load an externally drafted JavaScript file that would allow them to eventually perform actions on the target userÒ€ℒs behalf, including changing the userÒ€ℒs password or email address or changing the attackerÒ€ℒs user role from a low-privileged user to an administrator account.

πŸ“– Read

via "National Vulnerability Database".
❌ Linux Devices Under Attack by New FreakOut Malware ❌

The FreakOut malware is adding infected Linux devices to a botnet, in order to launch DDoS and cryptomining attacks.

πŸ“– Read

via "Threat Post".
🦿 New AI software can turn regular security cameras into COVID-19 policy enforcement points 🦿

Now being trialed in Georgia smart city Peachtree Corners, the new tech can pick up on people standing too close together and detect whether someone is wearing a mask.

πŸ“– Read

via "Tech Republic".
❌ SolarWinds Malware Arsenal Widens with Raindrop ❌

The post-compromise backdoor installs Cobalt Strike to help attackers more laterally through victim networks.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-28481 β€Ό

The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28482 β€Ό

This affects the package fastify-csrf before 3.0.0. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: cookieOpts: { path: '/', sameSite: true } 2. The CSRF token was available in the GET query parameter

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3182 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** D-Link DCS-5220 devices have a buffer overflow. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27733 β€Ό

Zoho ManageEngine Applications Manager before 14 build 14880 allows an authenticated SQL Injection via a crafted Alarmview request.

πŸ“– Read

via "National Vulnerability Database".