π¦Ώ The new Microsoft Edge browser will warn you if your password has been leaked online π¦Ώ
π Read
via "Tech Republic".
The new Edge 88 browser includes tough new security features, including a password generator and a tool for monitoring whether your login details have been exposed to the dark web.π Read
via "Tech Republic".
TechRepublic
The new Microsoft Edge browser will warn you if your password has been leaked online
The new Edge 88 browser includes tough new security features, including a password generator and a tool for monitoring whether your login details have been exposed to the dark web.
π΄ Why North Korea Excels in Cybercrime π΄
π Read
via "Dark Reading".
North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it.π Read
via "Dark Reading".
Dark Reading
Why North Korea Excels in Cybercrime
North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it.
π Friday Five 1/22 π
π Read
via "Digital Guardian".
Copycats, searchable phishing campaigns, and cybersecurity policy in the new administration - catch up on all of the week's infosec news with the Friday Five!π Read
via "Digital Guardian".
Digital Guardian
Friday Five 1/22
Copycats, searchable phishing campaigns, and cybersecurity policy in the new administration - catch up on all of the week's infosec news with the Friday Five!
βΌ CVE-2020-28488 βΌ
π Read
via "National Vulnerability Database".
This affects all versions of package jquery-ui; all versions of package org.fujion.webjars:jquery-ui. When the "dialog" is injected into an HTML tag more than once, the browser and the application may crash.π Read
via "National Vulnerability Database".
β Ransomware Attackers Publish 4K Private Scottish Gov Agency Files β
π Read
via "Threat Post".
Up to 4,000 stolen files have been released by hackers who launched a ransomware attack against the Scottish Environmental Protection Agency on Christmas Eve.π Read
via "Threat Post".
Threat Post
Ransomware Attackers Publish 4K Private Scottish Gov Agency Files
Up to 4,000 stolen files have been released by hackers who launched a ransomware attack against the Scottish Environmental Protection Agency on Christmas Eve.
β Discord-Stealing Malware Invades npm Packages β
π Read
via "Threat Post".
The CursedGrabber malware has infiltrated the open-source software code repository.π Read
via "Threat Post".
Threat Post
Discord-Stealing Malware Invades npm Packages
The CursedGrabber malware has infiltrated the open-source software code repository.
β ADT Tech Hacks Home-Security Cameras to Spy on Women β
π Read
via "Threat Post".
A former ADT employee pleads guilty of accessing customersβ cameras so he could spy on them.π Read
via "Threat Post".
Threat Post
ADT Tech Hacks Home-Security Cameras to Spy on Women
A former ADT employee pleads guilty of accessing customersβ cameras so he could spy on them.
βΌ CVE-2021-21259 βΌ
π Read
via "National Vulnerability Database".
HedgeDoc is open source software which lets you create real-time collaborative markdown notes. In HedgeDoc before version 1.7.2, an attacker can inject arbitrary JavaScript into a HedgeDoc note, which is executed when the note is viewed in slide mode. Depending on the configuration of the instance, the attacker may not need authentication to create or edit notes. The problem is patched in HedgeDoc 1.7.2. ### Workarounds Disallow loading JavaScript from 3rd party sites using the `Content-Security-Policy` header. Note that this will break some embedded content. ### References This issue was discovered by @TobiasHoll and reported to hackmdio/codimd: https://github.com/hackmdio/codimd/issues/1648 ### For more information If you have any questions or comments about this advisory: * Open an topic on our community forum * Join our matrix roomπ Read
via "National Vulnerability Database".
βΌ CVE-2021-21270 βΌ
π Read
via "National Vulnerability Database".
OctopusDSC is a PowerShell module with DSC resources that can be used to install and configure an Octopus Deploy Server and Tentacle agent. In OctopusDSC version 4.0.977 and earlier a customer API key used to connect to Octopus Server is exposed via logging in plaintext. This vulnerability is patched in version 4.0.1002.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21260 βΌ
π Read
via "National Vulnerability Database".
Online Invoicing System (OIS) is open source software which is a lean invoicing system for small businesses, consultants and freelancers created using AppGini. In OIS version 4.0 there is a stored XSS which can enables an attacker takeover of the admin account through a payload that extracts a csrf token and sends a request to change password. It has been found that Item description is reflected without sanitization in app/items_view.php which enables the malicious scenario.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28487 βΌ
π Read
via "National Vulnerability Database".
This affects the package vis-timeline before 7.4.4. An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4766 βΌ
π Read
via "National Vulnerability Database".
IBM MQ Internet Pass-Thru 2.1 and 9.2 could allow a remote user to cause a denial of service by sending malformed MQ data requests which would consume all available resources. IBM X-Force ID: 188093.π Read
via "National Vulnerability Database".
π¦Ώ Expert: Manpower is a huge cybersecurity issue in 2021 π¦Ώ
π Read
via "Tech Republic".
Changing threats, volume of threats, and ransomware plague organizations. Having some autonomous AI tools to help pros do their jobs can help.π Read
via "Tech Republic".
TechRepublic
Expert: Manpower is a huge cybersecurity issue in 2021
Changing threats, volume of threats, and ransomware plague organizations. Having some autonomous AI tools to help pros do their jobs can help.
π¦Ώ Cybersecurity pros can't handle all the threat tasks alone, expert says π¦Ώ
π Read
via "Tech Republic".
Having an AI tool to help can ease the burden on cybersecurity teams, which are struggling to keep up with constant and more serious threats.π Read
via "Tech Republic".
TechRepublic
Cybersecurity pros can't handle all the threat tasks alone, expert says
Having an AI tool to help can ease the burden on cybersecurity teams, which are struggling to keep up with constant and more serious threats.
π¦Ώ Cybersecurity: Blaming users is not the answer π¦Ώ
π Read
via "Tech Republic".
A punitive approach toward employees reporting data breaches intensifies problems.π Read
via "Tech Republic".
TechRepublic
Cybersecurity: Blaming users is not the answer
A punitive approach toward employees reporting data breaches intensifies problems.
βΌ CVE-2020-12514 βΌ
π Read
via "National Vulnerability Database".
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoverydπ Read
via "National Vulnerability Database".
βΌ CVE-2020-12513 βΌ
π Read
via "National Vulnerability Database".
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12525 βΌ
π Read
via "National Vulnerability Database".
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12511 βΌ
π Read
via "National Vulnerability Database".
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12512 βΌ
π Read
via "National Vulnerability Database".
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scriptingπ Read
via "National Vulnerability Database".
π΄ How Cybersecurity Newbs Can Start Out on the Right Foot π΄
π Read
via "Dark Reading".
Cybersecurity experts share their savvy tips and useful resources for infosec hopefuls.π Read
via "Dark Reading".
Dark Reading
How Cybersecurity Newbs Can Start Out on the Right Foot
Cybersecurity experts share their savvy tips and useful resources for infosec hopefuls.