πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-27950 β€Ό

A SQL injection vulnerability in azurWebEngine in Sita AzurCMS through 1.2.3.12 allows an authenticated attacker to execute arbitrary SQL commands via the id parameter to mesdocs.ajax.php in azurWebEngine/eShop. By default, the query is executed as DBA.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32735 β€Ό

Kirby is a content management system. In Kirby CMS versions 3.5.5 and 3.5.6, the Panel's `ListItem` component (used in the pages and files section for example) displayed HTML in page titles as it is. This could be used for cross-site scripting (XSS) attacks. Malicious authenticated Panel users can escalate their privileges if they get access to the Panel session of an admin user. Visitors without Panel access can use the attack vector if the site allows changing site data from a frontend form. Kirby 3.5.7 patches the vulnerability. As a partial workaround, site administrators can protect against attacks from visitors without Panel access by validating or sanitizing provided data from the frontend form.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Suricata IDPE 6.0.3 πŸ› 

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ SOC Investment Improves Detection and Response Times, Data Shows πŸ•΄

A survey of IT and security pros finds many are confident in their ability to detect security incidents in near-real time or within minutes.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft Issues New CVE for 'PrintNightmare' Flaw πŸ•΄

Company says remote code execution issue in all Windows versions is different from one in Windows Print Spooler that it had patched last month, though both affect same function.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Secured-Core PCs May Mitigate Firmware Attacks, But Adoption Lags πŸ•΄

Microsoft maintains that exploitation of recent Dell vulnerabilities would be blocked on ultra-secure PCs - but most systems do not have the technology yet.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-23402 β€Ό

All versions of package record-like-deep-assign are vulnerable to Prototype Pollution via the main functionality.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Barracuda Agrees to Acquire Skout Cybersecurity πŸ•΄

The acquisition will bring Barracuda into the extended detection and response (XDR) market with a tool for managed service providers.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-32737 β€Ό

Sulu is an open-source PHP content management system based on the Symfony framework. In versions of Sulu prior to 1.6.41, it is possible for a logged in admin user to add a script injection (cross-site-scripting) in the collection title. The problem is patched in version 1.6.41. As a workaround, one may manually patch the affected JavaScript files in lieu of updating.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23185 β€Ό

A stored cross site scripting (XSS) vulnerability in /administration/setting_security.php of PHP-Fusion 9.03.60 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23178 β€Ό

An issue exists in PHP-Fusion 9.03.50 where session cookies are not deleted once a user logs out, allowing for an attacker to perform a session replay attack and impersonate the victim user.

πŸ“– Read

via "National Vulnerability Database".
🦿 You don't have to be a tech expert to become a cybersecurity pro 🦿

Attention to detail, creativity and perseverance are key traits for a good white hat hacker. These positions are in high demand.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-36146 β€Ό

ACRN before 2.5 has a devicemodel/hw/pci/xhci.c NULL Pointer Dereference for a trb pointer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34527 β€Ό

Windows Print Spooler Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
❌ Ransomware Defense: Top 5 Things to Do Right Now ❌

Matt Bromiley, senior consultant with Mandiant Managed Defense, discusses the top tricks and tips for protecting enterprise environments from ransomware.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-23401 β€Ό

This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Watch for Cybersecurity Games at the Tokyo Olympics πŸ•΄

The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications.

πŸ“– Read

via "Dark Reading".
⚠ Kaseya ransomware attackers say: β€œPay $70 million and we’ll set everyone free” ⚠

Are you feeling generous? Do you want to help others? These cybercriminals are hoping someone is and does...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2020-26763 β€Ό

The Rocket.Chat desktop application 2.17.11 opens external links without user interaction.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.5.7 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Read

via "Packet Storm Security".
⚠ Kaseya ransomware attackers say: β€œPay $70 million and we’ll set everyone free” ⚠

Are you feeling generous? Do you want to help others? These cybercriminals are hoping someone is and does...

πŸ“– Read

via "Naked Security".