🕴 Accellion Data Breach Resulted in Extortion Attempts Against Multiple Victims 🕴
📖 Read
via "Dark Reading".
FireEye Mandiant says it discovered data stolen via flaw in Accellion FTA had landed on a Dark Web site associated with a known Russia-based threat group.📖 Read
via "Dark Reading".
Dark Reading
Accellion Data Breach Resulted in Extortion Attempts Against Multiple Victims
FireEye Mandiant says it discovered data stolen via flaw in Accellion FTA had landed on a Dark Web site associated with a known Russia-based threat group.
❌ TDoS Attacks Take Aim at Emergency First-Responder Services ❌
📖 Read
via "Threat Post".
The FBI has warned that telephony denial-of-service attacks are taking aim at emergency dispatch centers, which could make it impossible to call for police, fire or ambulance services.📖 Read
via "Threat Post".
Threat Post
TDoS Attacks Take Aim at Emergency First-Responder Services
The FBI has warned that telephony denial-of-service attacks are taking aim at emergency dispatch centers, which could make it impossible to call for police, fire or ambulance services.
🦿 Why non-human workers can increase security issues in your business 🦿
📖 Read
via "Tech Republic".
Most organizations don't give the same thought and attention to their non-human workers, such as bots, RPAs and service accounts, as they do human workers and identity lifecycles.📖 Read
via "Tech Republic".
TechRepublic
Why non-human workers can increase security issues in your business
Most organizations don't give the same thought and attention to their non-human workers, such as bots, RPAs and service accounts, as they do human workers and identity lifecycles.
🕴 Cybercrime Groups More Prolific, Focus on Healthcare in 2020 🕴
📖 Read
via "Dark Reading".
Almost four of every five attacks attributed in 2020 were conducted by cybercriminal groups, a significant jump from 2019, with attacks on healthcare or using the pandemic rising fast.📖 Read
via "Dark Reading".
Dark Reading
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Almost four of every five attacks attributed in 2020 were conducted by cybercriminal groups, a significant jump from 2019, with attacks on healthcare or using the pandemic rising fast.
🕴 Chinese-Affiliated APT31 Cloned & Used NSA Hacking Tool 🕴
📖 Read
via "Dark Reading".
APT31 cloned and reused a Windows-based hacking tool for years before Microsoft patched the vulnerability, researchers report.📖 Read
via "Dark Reading".
Darkreading
Chinese-Affiliated APT31 Cloned & Used NSA Hacking Tool
APT31 cloned and reused a Windows-based hacking tool for years before Microsoft patched the vulnerability, researchers report.
‼ CVE-2021-21154 ‼
📖 Read
via "National Vulnerability Database".
Heap buffer overflow in Tab Strip in Google Chrome prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26724 ‼
📖 Read
via "National Vulnerability Database".
OS Command Injection vulnerability when changing date settings or hostname using web GUI of Nozomi Networks Guardian and CMC allows authenticated administrators to perform remote code execution. This issue affects: Nozomi Networks Guardian 20.0.7.3 version 20.0.7.3 and prior versions. Nozomi Networks CMC 20.0.7.3 version 20.0.7.3 and prior versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29453 ‼
📖 Read
via "National Vulnerability Database".
The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center before version 8.5.11, from 8.6.0 before 8.13.3, and from 8.14.0 before 8.15.0 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21153 ‼
📖 Read
via "National Vulnerability Database".
Stack buffer overflow in GPU Process in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29448 ‼
📖 Read
via "National Vulnerability Database".
The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-36232 ‼
📖 Read
via "National Vulnerability Database".
The MessageBundleWhiteList class of atlassian-gadgets before version 4.2.37, from version 4.3.0 before 4.3.14, from version 4.3.2.0 before 4.3.2.4, from version 4.4.0 before 4.4.12, and from version 5.0.0 before 5.0.1 allowed unexpected DNS lookups and requests to arbitrary services as it incorrectly obtained application base url information from the executing http request which could be attacker controlled.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26068 ‼
📖 Read
via "National Vulnerability Database".
An endpoint in Atlassian Jira Server for Slack plugin from version 0.0.3 before version 2.0.15 allows remote attackers to execute arbitrary code via a template injection vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26725 ‼
📖 Read
via "National Vulnerability Database".
Path Traversal vulnerability when changing timezone using web GUI of Nozomi Networks Guardian, CMC allows an authenticated administrator to read-protected system files. This issue affects: Nozomi Networks Guardian 20.0.7.3 version 20.0.7.3 and prior versions. Nozomi Networks CMC 20.0.7.3 version 20.0.7.3 and prior versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21155 ‼
📖 Read
via "National Vulnerability Database".
Heap buffer overflow in Tab Strip in Google Chrome on Windows prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21151 ‼
📖 Read
via "National Vulnerability Database".
Use after free in Payments in Google Chrome prior to 88.0.4324.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21150 ‼
📖 Read
via "National Vulnerability Database".
Use after free in Downloads in Google Chrome on Windows prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21152 ‼
📖 Read
via "National Vulnerability Database".
Heap buffer overflow in Media in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21157 ‼
📖 Read
via "National Vulnerability Database".
Use after free in Web Sockets in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21156 ‼
📖 Read
via "National Vulnerability Database".
Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted script.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21149 ‼
📖 Read
via "National Vulnerability Database".
Stack buffer overflow in Data Transfer in Google Chrome on Linux prior to 88.0.4324.182 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-23827 ‼
📖 Read
via "National Vulnerability Database".
Keybase Desktop Client before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, allows an attacker to obtain potentially sensitive media (such as private pictures) in the Cache and uploadtemps directories. It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the "Explode message/Explode now" functionality. Local filesystem access is needed by the attacker.📖 Read
via "National Vulnerability Database".