βΌ CVE-2021-28114 βΌ
π Read
via "National Vulnerability Database".
Froala WYSIWYG Editor 3.2.6-1 is affected by XSS due to a namespace confusion during parsing.π Read
via "National Vulnerability Database".
π΄ 4 Future Integrated Circuit Threats to Watch π΄
π Read
via "Dark Reading".
Threats to the supply chains for ICs and other computer components are poised to wreak even more havoc on organizations.π Read
via "Dark Reading".
Dark Reading
4 Future Integrated Circuit Threats to Watch
Threats to the supply chains for ICs and other computer components are poised to wreak even more havoc on organizations.
π Friday Five 7/16 π
π Read
via "".
iOS zero days, the state of U.S. chipmaking, and the disruption of a phishing ring - catch up on all of the week's infosec news with the Friday Five!π Read
via "".
Digital Guardian
Friday Five 7/16
iOS zero days, the state of U.S. chipmaking, and the disruption of a phishing ring - catch up on all of the week's infosec news with the Friday Five!
β Want to earn $10 million? Snitch on a cybercrook! β
π Read
via "Naked Security".
Will going after the big guns help to discourage and disrupt the rest of the cybercrime ecosystem? Have your say...π Read
via "Naked Security".
Naked Security
Want to earn $10 million? Snitch on a cybercrook!
Will going after the big guns help to discourage and disrupt the rest of the cybercrime ecosystem? Have your sayβ¦
β Windows 0-Days Used Against Dissidents in Israeli Brokerβs Spyware β
π Read
via "Threat Post".
Candiru, aka Sourgum, allegedly sells the DevilsTongue surveillance malware to governments around the world.π Read
via "Threat Post".
Threat Post
Windows 0-Days Used Against Dissidents in Israeli Brokerβs Spyware
Candiru, aka Sourgum, allegedly sells the DevilsTongue surveillance malware to governments around the world.
β More PrintNightmare: βWe TOLD you not to turn the Print Spooler back on!β β
π Read
via "Naked Security".
The PrintNightmare continues. So does our advice, even though it stops your printer working.π Read
via "Naked Security".
Naked Security
More PrintNightmare: βWe TOLD you not to turn the Print Spooler back on!β
The PrintNightmare continues. So does our advice, even though it stops your printer working.
βΌ CVE-2021-3649 βΌ
π Read
via "National Vulnerability Database".
chatwoot is vulnerable to Inefficient Regular Expression Complexityπ Read
via "National Vulnerability Database".
βΌ CVE-2021-28054 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. A Stored Cross-Site Scripting (XSS) issue in "Configuration > Hosts" allows remote authenticated users to inject arbitrary web script or HTML via the Alias parameter.π Read
via "National Vulnerability Database".
β Critical Juniper Bug Allows DoS, RCE Against Carrier Networks β
π Read
via "Threat Post".
Telecom providers, including wireless carriers, are at risk of disruption of network service if the bug in SBR Carrier is exploited.π Read
via "Threat Post".
Threat Post
Critical Juniper Bug Allows DoS, RCE Against Carrier Networks
Telecom providers, including wireless carriers, are at risk for the disruption of network service if the bug in SBR Carrier is exploited.
βΌ CVE-2020-4821 βΌ
π Read
via "National Vulnerability Database".
IBM InfoSphere Data Replication 11.4 and IBM InfoSphere Change Data Capture for z/OS 10.2.1, under certain configurations, could allow a user to bypass authentication mechanisms using an empty password string. IBM X-Force ID: 189834π Read
via "National Vulnerability Database".
βΌ CVE-2020-4980 βΌ
π Read
via "National Vulnerability Database".
IBM QRadar SIEM 7.3 and 7.4 uses less secure methods for protecting data in transit between hosts when encrypt host connections is not enabled as well as data at rest. IBM X-Force ID: 192539.π Read
via "National Vulnerability Database".
π΄ Recent Attacks Lead to Renewed Calls for Banning Ransom Payments π΄
π Read
via "Dark Reading".
While attackers in protected jurisdictions continue to get massive sums for continuing to breach organizations, the ransomware threat will only continue to grow.π Read
via "Dark Reading".
Dark Reading
Recent Attacks Lead to Renewed Calls for Banning Ransom Payments
While attackers in protected jurisdictions continue to get massive sums for continuing to breach organizations, the ransomware threat will only continue to grow.
π¦Ώ The number of false positive security alerts is staggering. Here's what you can do to reduce yours π¦Ώ
π Read
via "Tech Republic".
Nearly half of all cybersecurity alerts are false positives, and 75% of companies spend an equal amount of time, or more, on them than on actual attacks, a Fastly/ESG report reveals.π Read
via "Tech Republic".
TechRepublic
The number of false positive security alerts is staggering. Here's what you can do to reduce yours
Nearly half of all cybersecurity alerts are false positives, and 75% of companies spend an equal amount of time, or more, on them than on actual attacks, a Fastly/ESG report reveals.
βΌ CVE-2021-32769 βΌ
π Read
via "National Vulnerability Database".
Micronaut is a JVM-based, full stack Java framework designed for building JVM applications. A path traversal vulnerability exists in versions prior to 2.5.9. With a basic configuration, it is possible to access any file from a filesystem, using "/../../" in the URL. This occurs because Micronaut does not restrict file access to configured paths. The vulnerability is patched in version 2.5.9. As a workaround, do not use `**` in mapping, use only `*`, which exposes only flat structure of a directory not allowing traversal. If using Linux, another workaround is to run micronaut in chroot.π Read
via "National Vulnerability Database".
π΄ Researchers Create New Approach to Detect Brand Impersonation π΄
π Read
via "Dark Reading".
A team of Microsoft researchers developed and trained a Siamese Neural Network to detect brand impersonation attacks.π Read
via "Dark Reading".
Dark Reading
Researchers Create New Approach to Detect Brand Impersonation
A team of Microsoft researchers developed and trained a Siamese Neural Network to detect brand impersonation attacks.
β Top CVEs Trending with Cybercriminals β
π Read
via "Threat Post".
An analysis of criminal forums reveal what publicly known vulnerabilities attackers are most interested in.π Read
via "Threat Post".
Threat Post
Top CVEs Trending with Cybercriminals
An analysis of criminal forums reveal what publicly known vulnerabilities attackers are most interested in.
π¦Ώ Kaseya attack: "Yes, we can do something about this, and we should do something about this" π¦Ώ
π Read
via "Tech Republic".
The Kaseya attack is especially unique because it didn't begin with a password breach, and the companies were following cybersecurity best practices. So, how can we protect against this threat?π Read
via "Tech Republic".
TechRepublic
Kaseya attack: How ransomeware attacks are like startups and what we need to do about that
The Kaseya attack is especially unique because it didn't begin with a password breach, and the companies were following cybersecurity best practices. So, how can we protect against this threat?
β Linux Variant of HelloKitty Ransomware Targets VMware ESXi Servers β
π Read
via "Threat Post".
HelloKitty joins the growing list of ransomware bigwigs going after the juicy target of VMware ESXi, where one hit gets scads of VMs.π Read
via "Threat Post".
Threat Post
Linux Variant of HelloKitty Ransomware Targets VMware ESXi Servers
HelloKitty joins the growing list of ransomware bigwigs going after the juicy target of VMware ESXi, where one hit gets scads of VMs.
βΌ CVE-2021-34447 βΌ
π Read
via "National Vulnerability Database".
Windows MSHTML Platform Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34497.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34464 βΌ
π Read
via "National Vulnerability Database".
Microsoft Defender Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34522.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34459 βΌ
π Read
via "National Vulnerability Database".
Windows AppContainer Elevation Of Privilege Vulnerabilityπ Read
via "National Vulnerability Database".