πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-33713 β€Ό

A vulnerability has been identified in JT Utilities (All versions < V13.0.2.0). When parsing specially crafted JT files, a hash function is called with an incorrect argument leading the application to crash. An attacker could leverage this vulnerability to cause a Denial-of-Service condition in the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31893 β€Ό

A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC PDM (All versions < V9.2), SIMATIC STEP 7 V5.X (All versions < V5.6 SP2 HF3), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 HF2). The affected software contains a buffer overflow vulnerability while handling certain files that could allow a local attacker to trigger a denial-of-service condition or potentially lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34321 β€Ό

A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The VisDraw.dll library in affected applications lacks proper validation of user-supplied data when parsing J2K files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-13414)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34306 β€Ό

A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The BMP_Loader.dll library in affected applications lacks proper validation of user-supplied data when parsing BMP files. This could result in a memory corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13342)

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Tool Sprawl & False Positives Hold Security Teams Back πŸ•΄

Security teams spend as much time addressing false positive alerts as they do addressing actual cyberattacks, survey data shows.

πŸ“– Read

via "Dark Reading".
❌ SolarWinds Issues Hotfix for Zero-Day Flaw Under Active Attack ❌

Microsoft alerted the company to a security vulnerability in its Serv-U Managed File Transfer and Secure FTP products that a cyberattacker is using to target a β€œlimited” amount of customers.

πŸ“– Read

via "Threat Post".
🦿 When it comes to incident response, is your cyberinsurance carrier on your side? 🦿

Just as security leaders and pros are firming up their policies and strategies to secure hybrid work for the foreseeable futureβ€”they get hit with an all-out assault of ransomware attacks.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-36376 β€Ό

dandavison delta before 0.8.3 on Windows resolves an executable's pathname as a relative path from the current directory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22440 β€Ό

There is a path traversal vulnerability in some Huawei products. The vulnerability is due to that the software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly validate the pathname. Successful exploit could allow the attacker to access a location that is outside of the restricted directory by a crafted filename. Affected product versions include:HUAWEI Mate 20 9.0.0.195(C01E195R2P1), 9.1.0.139(C00E133R3P1);HUAWEI Mate 20 Pro 9.0.0.187(C432E10R1P16), 9.0.0.188(C185E10R2P1), 9.0.0.245(C10E10R2P1), 9.0.0.266(C432E10R1P16), 9.0.0.267(C636E10R2P1), 9.0.0.268(C635E12R1P16), 9.0.0.278(C185E10R2P1); Hima-L29C 9.0.0.105(C10E9R1P16), 9.0.0.105(C185E9R1P16), 9.0.0.105(C636E9R1P16); Laya-AL00EP 9.1.0.139(C786E133R3P1); OxfordS-AN00A 10.1.0.223(C00E210R5P1); Tony-AL00B 9.1.0.257(C00E222R2P1).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The Trouble With Automated Cybersecurity Defenses πŸ•΄

While there's enormous promise in AI-powered tools and machine learning, they are very much a double-edged sword.

πŸ“– Read

via "Dark Reading".
❌ New CISA Director Confirmed, White House Gains Cyber-Director ❌

Jen Easterly, former NSA official and Morgan Stanley vet, will take up the lead at CISA as the ransomware scourge rages on.

πŸ“– Read

via "Threat Post".
❌ Is Remote Desktop Protocol Secure? It Can Be ❌

Matt Dunn, associate managing director in Kroll's Cyber Risk practice, discusses options for securing RDP, which differ significantly in terms of effectiveness.

πŸ“– Read

via "Threat Post".
πŸ•΄ Can Government Effectively Help Businesses Fight Cybercrime? πŸ•΄

From the Biden administration's pledge to take action to INTERPOL's focus on ransomware as a global threat, governments are looking to help businesses cope with cyberattacks. But can it really work?

πŸ“– Read

via "Dark Reading".
πŸ›  Global Socket 1.4.33 πŸ› 

Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.

πŸ“– Read

via "Packet Storm Security".
⚠ Don’t get tricked by this crashtastic iPhone Wi-Fi hack! ⚠

Learn how the trick works so that you can avoid it in case someone thinks it's a joke to catch you out.

πŸ“– Read

via "Naked Security".
πŸ•΄ Enterprises Altering Their Supply Chain Defenses on Heels of Latest Breaches πŸ•΄

More than half of enterprises surveyed for Dark Reading's State of Malware Threats report indicate they are making at least a few changes to their supply chain security defenses following recent attacks on software vendors such as SolarWinds.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-36123 β€Ό

An issue was discovered in Echo ShareCare 8.15.5. The TextReader feature in General/TextReader/TextReader.cfm is susceptible to a local file inclusion vulnerability when processing remote input in the textFile parameter from an authenticated user, leading to the ability to read arbitrary files on the server filesystems as well any files accessible via Universal Naming Convention (UNC) paths.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-22875 β€Ό

Integer overflow vulnerability in function Jsi_ObjSetLength in jsish before 3.0.6, allows remote attackers to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
❌ β€˜Charming Kitten’ APT Siphons Intel From Mid-East Scholars ❌

Professors, journalists and think-tank personnel, beware strangers bearing webinars: It’s the focus of a particularly sophisticated, and chatty, phishing campaign.

πŸ“– Read

via "Threat Post".
πŸ•΄ Why We Need to Raise the Red Flag Against FragAttacks πŸ•΄

Proliferation of wireless devices increases the risk that corporate networks will be attacked with this newly discovered breed of Wi-Fi-based cyber assault.

πŸ“– Read

via "Dark Reading".
🦿 Bad actor offers up for sale data from 600 million LinkedIn members scraped from the site 🦿

Cyber News reports that this is the third time in four months that member information has shown up on a hacker forum.

πŸ“– Read

via "Tech Republic".