βΌ CVE-2021-3120 βΌ
π Read
via "National Vulnerability Database".
An arbitrary file upload vulnerability in the YITH WooCommerce Gift Cards Premium plugin before 3.3.1 for WordPress allows remote attackers to achieve remote code execution on the operating system in the security context of the web server. In order to exploit this vulnerability, an attacker must be able to place a valid Gift Card product into the shopping cart. An uploaded file is placed at a predetermined path on the web server with a user-specified filename and extension. This occurs because the ywgc-upload-picture parameter can have a .php value even though the intention was to only allow uploads of Gift Card images.π Read
via "National Vulnerability Database".
βΌ CVE-2021-27559 βΌ
π Read
via "National Vulnerability Database".
The Contact page in Monica 2.19.1 allows stored XSS via the Nickname field.π Read
via "National Vulnerability Database".
βΌ CVE-2020-24175 βΌ
π Read
via "National Vulnerability Database".
Buffer overflow in Yz1 0.30 and 0.32, as used in IZArc 4.4, ZipGenius 6.3.2.3116, and Explzh (extension) 8.14, allows attackers to execute arbitrary code via a crafted archive file, related to filename handling.π Read
via "National Vulnerability Database".
βΌ CVE-2021-27368 βΌ
π Read
via "National Vulnerability Database".
The Contact page in Monica 2.19.1 allows stored XSS via the First Name field.π Read
via "National Vulnerability Database".
βΌ CVE-2021-27370 βΌ
π Read
via "National Vulnerability Database".
The Contact page in Monica 2.19.1 allows stored XSS via the Last Name field.π Read
via "National Vulnerability Database".
βΌ CVE-2021-27369 βΌ
π Read
via "National Vulnerability Database".
The Contact page in Monica 2.19.1 allows stored XSS via the Middle Name field.π Read
via "National Vulnerability Database".
π¦Ώ These two areas are CISOs' top priorities this year π¦Ώ
π Read
via "Tech Republic".
Team8 surveyed cybersecurity leaders to find out where they will spend their money in 2021.π Read
via "Tech Republic".
TechRepublic
These two areas are CISOs' top priorities this year
Team8 surveyed cybersecurity leaders to find out where they will spend their money in 2021.
π¦Ώ Cybersecurity pros: Automation and app security are top priorities in 2021 π¦Ώ
π Read
via "Tech Republic".
A study on CIO and CISO prioritization showed these two areas are most important this year. Cloud security is another area high on their lists.π Read
via "Tech Republic".
TechRepublic
Cybersecurity pros: Automation and app security are top priorities in 2021
A study on CIO and CISO prioritization showed these two areas are most important this year. Cloud security is another area high on their lists.
β Assume ClubHouse Conversations Are Being Recorded, Researchers Warn β
π Read
via "Threat Post".
At nearly a year old, the invitation-only, audio-based social-media platform ClubHouse is grappling with security issues on multiple fronts, but the consensus among researchers is coming into focus: Assume your ClubHouse conversations are being recorded. The company confirmed to Bloomberg that over the weekend a user was able to breach βmultipleβ ClubHouse room audio feeds [β¦]π Read
via "Threat Post".
Threat Post
Assume Clubhouse Conversations Are Being Recorded, Researchers Warn
Two breaches of the audio-based social media app reinforce privacy, security concerns.
π΄ Sequoia Capital Suffers Data Breach π΄
π Read
via "Dark Reading".
The attack began with a successful phishing email.π Read
via "Dark Reading".
Dark Reading
Sequoia Capital Suffers Data Breach
The attack began with a successful phishing email.
π Oklahoma Introduces Consumer Data Privacy Bill π
π Read
via "Digital Guardian".
Yet another state has introduced its own data privacy bill: The Oklahoma Computer Data Privacy Act would require organizations get consent before collecting and selling user data.π Read
via "Digital Guardian".
Digital Guardian
Oklahoma Introduces Consumer Data Privacy Bill
Yet another state has introduced its own data privacy bill: The Oklahoma Computer Data Privacy Act would require organizations get consent before collecting and selling user data.
π΄ Researcher Reports Vulnerability in Apple iCloud Domain π΄
π Read
via "Dark Reading".
A stored cross-site scripting vulnerability in the iCloud website reportedly earned a security researcher $5,000.π Read
via "Dark Reading".
Dark Reading
Researcher Reports Vulnerability in Apple iCloud Domain
A stored cross-site scripting vulnerability in the iCloud website reportedly earned a security researcher $5,000.
β Chinese Hackers Hijacked NSA-Linked Hacking Tool: Report β
π Read
via "Threat Post".
APT31, a Chinese-affiliated threat group, copied a Microsoft Windows exploit previously used by the Equation Group, said researchers.π Read
via "Threat Post".
Threat Post
Chinese Hackers Hijacked NSA-Linked Hacking Tool: Report
APT31, a Chinese-affiliated threat group, copied a Microsoft Windows exploit previously used by the Equation Group, said researchers.
βΌ CVE-2021-27279 βΌ
π Read
via "National Vulnerability Database".
MyBB before 1.8.25 allows stored XSS via nested [email] tags with MyCode (aka BBCode).π Read
via "National Vulnerability Database".
π΄ Accellion Data Breach Resulted in Extortion Attempts Against Multiple Victims π΄
π Read
via "Dark Reading".
FireEye Mandiant says it discovered data stolen via flaw in Accellion FTA had landed on a Dark Web site associated with a known Russia-based threat group.π Read
via "Dark Reading".
Dark Reading
Accellion Data Breach Resulted in Extortion Attempts Against Multiple Victims
FireEye Mandiant says it discovered data stolen via flaw in Accellion FTA had landed on a Dark Web site associated with a known Russia-based threat group.
β TDoS Attacks Take Aim at Emergency First-Responder Services β
π Read
via "Threat Post".
The FBI has warned that telephony denial-of-service attacks are taking aim at emergency dispatch centers, which could make it impossible to call for police, fire or ambulance services.π Read
via "Threat Post".
Threat Post
TDoS Attacks Take Aim at Emergency First-Responder Services
The FBI has warned that telephony denial-of-service attacks are taking aim at emergency dispatch centers, which could make it impossible to call for police, fire or ambulance services.
π¦Ώ Why non-human workers can increase security issues in your business π¦Ώ
π Read
via "Tech Republic".
Most organizations don't give the same thought and attention to their non-human workers, such as bots, RPAs and service accounts, as they do human workers and identity lifecycles.π Read
via "Tech Republic".
TechRepublic
Why non-human workers can increase security issues in your business
Most organizations don't give the same thought and attention to their non-human workers, such as bots, RPAs and service accounts, as they do human workers and identity lifecycles.
π΄ Cybercrime Groups More Prolific, Focus on Healthcare in 2020 π΄
π Read
via "Dark Reading".
Almost four of every five attacks attributed in 2020 were conducted by cybercriminal groups, a significant jump from 2019, with attacks on healthcare or using the pandemic rising fast.π Read
via "Dark Reading".
Dark Reading
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Almost four of every five attacks attributed in 2020 were conducted by cybercriminal groups, a significant jump from 2019, with attacks on healthcare or using the pandemic rising fast.
π΄ Chinese-Affiliated APT31 Cloned & Used NSA Hacking Tool π΄
π Read
via "Dark Reading".
APT31 cloned and reused a Windows-based hacking tool for years before Microsoft patched the vulnerability, researchers report.π Read
via "Dark Reading".
Darkreading
Chinese-Affiliated APT31 Cloned & Used NSA Hacking Tool
APT31 cloned and reused a Windows-based hacking tool for years before Microsoft patched the vulnerability, researchers report.
βΌ CVE-2021-21154 βΌ
π Read
via "National Vulnerability Database".
Heap buffer overflow in Tab Strip in Google Chrome prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2021-26724 βΌ
π Read
via "National Vulnerability Database".
OS Command Injection vulnerability when changing date settings or hostname using web GUI of Nozomi Networks Guardian and CMC allows authenticated administrators to perform remote code execution. This issue affects: Nozomi Networks Guardian 20.0.7.3 version 20.0.7.3 and prior versions. Nozomi Networks CMC 20.0.7.3 version 20.0.7.3 and prior versions.π Read
via "National Vulnerability Database".