πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Kaseya ransomware attackers say: β€œPay $70 million and we’ll set everyone free” ⚠

Are you feeling generous? Do you want to help others? These cybercriminals are hoping someone is and does...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2020-26763 β€Ό

The Rocket.Chat desktop application 2.17.11 opens external links without user interaction.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.5.7 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Read

via "Packet Storm Security".
⚠ Kaseya ransomware attackers say: β€œPay $70 million and we’ll set everyone free” ⚠

Are you feeling generous? Do you want to help others? These cybercriminals are hoping someone is and does...

πŸ“– Read

via "Naked Security".
⚠ S3 Ep 39.5: A conversation with Eva Galperin [Podcast] ⚠

Cryptography, privacy, stalkerware and how infosec professionals relax. Listen, enjoy and learn!

πŸ“– Read

via "Naked Security".
❌ Kaseya Attack Fallout: CISA, FBI Offer Guidance ❌

Following a brazen ransomware attack by the REvil cybergang, CISA and FBI offer guidance to victims.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-36158 β€Ό

In the xrdp package (in branches through 3.14) for Alpine Linux, RDP sessions are vulnerable to man-in-the-middle attacks because pre-generated RSA certificates and private keys are used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32233 β€Ό

SmarterTools SmarterMail before Build 7776 allows XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24389 β€Ό

The WP Foodbakery WordPress plugin before 2.2, used in the FoodBakery WordPress theme before 2.2 did not properly sanitize the foodbakery_radius parameter before outputting it back in the response, leading to an unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24386 β€Ό

The WP SVG images WordPress plugin before 3.4 did not sanitise the SVG files uploaded, which could allow low privilege users such as author+ to upload a malicious SVG and then perform XSS attacks by inducing another user to access the file directly. In v3.4, the plugin restricted such upload to editors and admin, with an option to also allow author to do so. The description of the plugin has also been updated with a security warning as upload of such content is intended.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24407 β€Ό

The Jannah WordPress theme before 5.4.5 did not properly sanitize the 'query' POST parameter in its tie_ajax_search AJAX action, leading to a Reflected Cross-site Scripting (XSS) vulnerability.

πŸ“– Read

via "National Vulnerability Database".
🦿 Critical flaws in Windows Print spooler service could allow for remote attacks 🦿

Administrators are urged to apply the latest patches from Microsoft and disable the Windows Print spooler service in domain controllers and systems not used for printing.

πŸ“– Read

via "Tech Republic".
πŸ•΄ 8 Ways to Preserve Legal Privilege After a Cybersecurity Incident πŸ•΄

Knowing your legal distinctions can make defense easier should you end up in court after a breach, attack, or data loss.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-27930 β€Ό

Multiple stored cross-site scripting (XSS) vulnerabilities in IRIS IrisNext 9.5.16 allow remote authenticated users to inject arbitrary web script or HTML via a document or folder name that is mishandled when rendering the contact form or search form.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32559 β€Ό

An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cyberattack on Kaseya Nets More Than 1,000 Victims, $70M Ransom Demand πŸ•΄

The provider of remote monitoring and management services warns customers to not run its software until a patch is available and manually installed.

πŸ“– Read

via "Dark Reading".
🦿 Kaseya supply chain attack impacts more than 1,000 companies 🦿

The REvil group is claiming that over 1 million devices have been infected and is demanding $70 million for a universal decryption key.

πŸ“– Read

via "Tech Republic".
❌ Kaseya Patches Imminent After Zero-Day Exploits, 1,500 Impacted ❌

REvil ransomware gang lowers price for universal decryptor after massive worldwide ransomware push against Kaseya security vulnerability CVE-2021-30116.

πŸ“– Read

via "Threat Post".
🦿 The Audacity! How to wreck an open-source project and anger a community 🦿

Audacity software has been acquired, and the new verbiage added to the privacy policy has the open-source community up in arms.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-31771 β€Ό

Splinterware System Scheduler Professional version 5.30 is subject to insecure folders permissions issue impacting where the service 'WindowsScheduler' calls its executable. This allow a non-privileged user to execute arbitrary code with elevated privileges (system level privileges as "nt authority\system") since the service runs as Local System.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32740 β€Ό

Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.

πŸ“– Read

via "National Vulnerability Database".