π¦Ώ Kaseya supply chain attack impacts more than 1,000 companies π¦Ώ
π Read
via "Tech Republic".
The REvil group is claiming that over 1 million devices have been infected and is demanding $70 million for a universal decryption key.π Read
via "Tech Republic".
TechRepublic
Kaseya supply chain attack impacts more than 1,000 companies
The REvil group is claiming that over 1 million devices have been infected and is demanding $70 million for a universal decryption key.
β Kaseya Patches Imminent After Zero-Day Exploits, 1,500 Impacted β
π Read
via "Threat Post".
REvil ransomware gang lowers price for universal decryptor after massive worldwide ransomware push against Kaseya security vulnerability CVE-2021-30116.π Read
via "Threat Post".
Threat Post
Kaseya Patches Imminent After Zero-Day Exploits, 1,500 Impacted
REvil ransomware gang lowers price for universal decryptor after massive worldwide ransomware push against Kaseya security vulnerability CVE-2021-30116.
π¦Ώ The Audacity! How to wreck an open-source project and anger a community π¦Ώ
π Read
via "Tech Republic".
Audacity software has been acquired, and the new verbiage added to the privacy policy has the open-source community up in arms.π Read
via "Tech Republic".
TechRepublic
The Audacity! How to wreck an open-source project and anger a community
Audacity software has been acquired, and the new verbiage added to the privacy policy has the open-source community up in arms.
βΌ CVE-2021-31771 βΌ
π Read
via "National Vulnerability Database".
Splinterware System Scheduler Professional version 5.30 is subject to insecure folders permissions issue impacting where the service 'WindowsScheduler' calls its executable. This allow a non-privileged user to execute arbitrary code with elevated privileges (system level privileges as "nt authority\system") since the service runs as Local System.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32740 βΌ
π Read
via "National Vulnerability Database".
Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.π Read
via "National Vulnerability Database".
π΄ It's High Time for a Security Scoring System for Applications and Open Source Libraries π΄
π Read
via "Dark Reading".
A benchmarking system would help buyers choose more secure software products and, more importantly, light a fire underneath software producers to make products secure.π Read
via "Dark Reading".
π What is GLBA Compliance? Understanding the Data Protection Requirements of the Gramm-Leach-Bliley Act in 2021 π
π Read
via "".
Learn about what GLBA means for data protection and how to achieve GLBA compliance in Data Protection 101, our series on the fundamentals of information security.π Read
via "".
Digitalguardian
What is GLBA Compliance? (Understand Requirements)
Learn about what GLBA means for data protection and how to achieve GLBA compliance in Data Protection 101, our series on the fundamentals of information security.
β Western Digital Users Face Another RCE β
π Read
via "Threat Post".
Say hello to one more zero-day and yet more potential remote data death for those who canβt/wonβt upgrade their My Cloud storage devices.π Read
via "Threat Post".
Threat Post
Western Digital Users Face Another RCE
Say hello to one more zero-day and yet more potential remote data death for those who canβt/wonβt upgrade their My Cloud storage devices.
π¦Ώ 1 in 4 employees say they still have access to accounts from past jobs, survey finds π¦Ώ
π Read
via "Tech Republic".
Nearly half of professionals also admit to sharing passwords and more than a third say they write them on paper, according to Beyond Identity.π Read
via "Tech Republic".
TechRepublic
1 in 4 employees say they still have access to accounts from past jobs, survey finds
Nearly half of professionals also admit to sharing passwords and more than a third say they write them on paper, according to Beyond Identity.
π΄ Workers Careless in Sharing & Reusing Corporate Secrets π΄
π Read
via "Dark Reading".
A new survey shows leaked enterprise secrets costs companies millions of dollars each year.π Read
via "Dark Reading".
π¦Ώ The mobile and desktop versions of Firefox Total Cookie Protection are now available π¦Ώ
π Read
via "Tech Republic".
Jack Wallen explains how to protect your web browsing from supercookies with Firefox's new privacy feature.π Read
via "Tech Republic".
TechRepublic
Firefox Total Cookie Protection comes to mobile and desktop versions
Jack Wallen explains what supercookies are and how to protect your web browsing against them with Firefox's new privacy feature.
β Android Apps in Google Play Harvest Facebook Credentials β
π Read
via "Threat Post".
The apps all used an unusual tactic of loading a legitimate Facebook page as part of the data theft.π Read
via "Threat Post".
Threat Post
Android Apps in Google Play Harvest Facebook Credentials
The apps all used an unusual tactic of loading a legitimate Facebook page as part of the data theft.
βΌ CVE-2021-34190 βΌ
π Read
via "National Vulnerability Database".
A stored cross site scripting (XSS) vulnerability in index.php?menu=billing_rates of Issabel PBX version 4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Name" or "Prefix" fields under the "Create New Rate" module.π Read
via "National Vulnerability Database".
π΄ Researchers Learn From Nation-State Attackers' OpSec Mistakes π΄
π Read
via "Dark Reading".
Security researchers discuss how a series of simple and consistent mistakes helped them learn more about ITG18, better known as Charming Kitten.π Read
via "Dark Reading".
Dark Reading
Researchers Learn From Nation-State Attackers' OpSec Mistakes
Security researchers discuss how a series of simple and consistent mistakes helped them learn more about ITG18, better known as Charming Kitten.
βΌ CVE-2020-22249 βΌ
π Read
via "National Vulnerability Database".
Remote Code Execution vulnerability in phplist 3.5.1. The application does not check any file extensions stored in the plugin zip file, Uploading a malicious plugin which contains the php files with extensions like PHP,phtml,php7 will be copied to the plugins directory which would lead to the remote code executionπ Read
via "National Vulnerability Database".
βΌ CVE-2021-22229 βΌ
π Read
via "National Vulnerability Database".
An issue has been discovered in GitLab CE/EE affecting all versions starting with 12.8. Under a special condition it was possible to access data of an internal repository through project fork done by a project member.π Read
via "National Vulnerability Database".
βΌ CVE-2020-22251 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability in phpList 3.5.3 via the login name field in Manage Administrators when adding a new admin.π Read
via "National Vulnerability Database".
βΌ CVE-2020-23697 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting vulnerabilty in Monstra CMS 3.0.4 via the page feature in admin/index.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22228 βΌ
π Read
via "National Vulnerability Database".
An issue has been discovered in GitLab affecting all versions. Improper access control allows unauthorised users to access project details using Graphql.π Read
via "National Vulnerability Database".
β Pro-Trump βGettrβ Social Platform Hacked On Day One β
π Read
via "Threat Post".
The newborn platform was inundated by Sonic the Hedgehog-themed porn and had prominent users' profiles defaced. Next, hackers posted its user database online.π Read
via "Threat Post".
Threat Post
Pro-Trump βGettrβ Social Platform Hacked On Day One
The newborn platform was inundated by Sonic the Hedgehog-themed porn and had prominent users' profiles defaced. Next, hackers posted its user database online.
βΌ CVE-2021-35039 βΌ
π Read
via "National Vulnerability Database".
kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.π Read
via "National Vulnerability Database".