🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
Microsoft Disrupts Large-Scale, Cloud-Based BEC Campaign

Varied cloud infrastructure was used to phish email credentials, monitor for and forward finance-related messages and automate operations.

📖 Read

via "Threat Post".
Malicious PDFs Flood the Web, Lead to Password-Snarfing

SolarMarker makers are using SEO poisoning, stuffing thousands of PDFs with tens of thousands of pages full of SEO keywords & links to redirect to the malware.

📖 Read

via "Threat Post".
🕴 What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain 🕴

Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.

📖 Read

via "Dark Reading".
🕴 Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities 🕴

Terbium Labs' products and services will become part of Deloitte's Detect & Respond lineup, the company confirms.

📖 Read

via "Dark Reading".
CVE-2021-31497

This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of DWG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13311.

📖 Read

via "National Vulnerability Database".
CVE-2021-31487

This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12715.

📖 Read

via "National Vulnerability Database".
🕴 Andariel Group Targets South Korean Entities in New Campaign 🕴

Andariel, designated as a sub-group of the Lazarus Group APT, has historically targeted South Korean organzations.

📖 Read

via "Dark Reading".
Millions of Connected Cameras Open to Eavesdropping

A supply-chain component lays open camera feeds to remote attackers thanks to a critical security vulnerability.

📖 Read

via "Threat Post".
🕴 Security Experts Scrutinize Apple, Amazon IoT Networks 🕴

Both companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices worries some security researchers.

📖 Read

via "Dark Reading".
🕴 Microsoft Disrupts Large-Scale BEC Campaign Across Web Services 🕴

Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.

📖 Read

via "Dark Reading".
🕴 Thousands of VMware vCenter Servers Remain Open to Attack Over the Internet 🕴

Three weeks after company disclosed two critical vulnerabilities in the workload management utility, many organizations have not patched the technology yet, security vendor says.

📖 Read

via "Dark Reading".
CVE-2021-34170

Bandai Namco FromSoftware Dark Souls III allows remote attackers to execute arbitrary code.

📖 Read

via "National Vulnerability Database".
CVE-2020-21316

A Cross-site scripting (XSS) vulnerability exists in the comment section in ZrLog 2.1.3, which allows remote attackers to inject arbitrary web script and stolen administrator cookies via the nickname parameter and gain access to the admin panel.

📖 Read

via "National Vulnerability Database".
CVE-2021-30550

Use after free in Accessibility in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

📖 Read

via "National Vulnerability Database".
CVE-2021-24037

A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.

📖 Read

via "National Vulnerability Database".
CVE-2021-32623

Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. To exploit this, users need to have ingest privileges, limiting the group of potential attackers The problem has been fixed in Opencast 9.6. There is no known workaround for this issue.

📖 Read

via "National Vulnerability Database".
CVE-2020-9493

A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.

📖 Read

via "National Vulnerability Database".
Peloton Bike+ Bug Gives Hackers Complete Control

An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios.

📖 Read

via "Threat Post".
Researchers: Booming Cyber-Underground Market for Initial-Access Brokers

Ransomware gangs are increasingly buying their way into corporate networks, purchasing access from 'vendors' that have previously installed backdoors on targets.

📖 Read

via "Threat Post".
CVE-2021-21441

There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions.

📖 Read

via "National Vulnerability Database".
5 Tips to Prevent and Mitigate Ransomware Attacks

Ransomware attacks are increasing in frequency, and the repercussions are growing more severe than ever. Here are 5 ways to prevent your company from becoming the next headline.

📖 Read

via "Threat Post".