πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Windows β€œPetitPotam” network attack – how to protect against it ⚠

A cute name but an annoying and potentially damaging attack. Here's what to do.

πŸ“– Read

via "Naked Security".
❌ Apple Patches Actively Exploited Zero-Day in iOS, MacOS ❌

Company urges iPhone, iPad and Mac users to install updates to fix a critical memory corruption flaw that can allow for attackers to take over a system.

πŸ“– Read

via "Threat Post".
⚠ Apple emergency zero-day fix for iPhones and Macs – get it now! ⚠

You're probably expecting us to say, "Patch early, patch often." And that is EXACTLY what we're saying!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-20399 β€Ό

IBM Qradar SIEM 7.3.0 to 7.3.3 Patch 8 and 7.4.0 to 7.4.3 GA is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 196073.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20562 β€Ό

IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_3 and 6.1.0.0 through 6.1.0.2 vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199232.

πŸ“– Read

via "National Vulnerability Database".
❌ Three Zero-Day Bugs Plague Kaseya Unitrends Backup Servers ❌

The unpatched flaws include RCE and authenticated privilege escalation on the client-side: Just the latest woe for the ransomware-walloped MSP.

πŸ“– Read

via "Threat Post".
❌ Zimbra Server Bugs Could Lead to Email Plundering ❌

Two bugs, now patched except in older versions, could be chained to allow attackers to hijack Zimbra server by simply sending a malicious email.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-34432 β€Ό

In Eclipse Mosquitto versions 2.07 and earlier, the server will crash if the client tries to send a PUBLISH packet with topic length = 0.

πŸ“– Read

via "National Vulnerability Database".
πŸ” New Microsoft Teams Integration Provides Visibility, Controls to Prevent Data Loss πŸ”

Digital Guardian's integration with Microsoft Teams allows organizations to reduce the risk of data loss without hampering productivity.

πŸ“– Read

via "".
🦿 Frequently asked questions on Extended Detection and Response 🦿

This article answers a few of the more common questions from those who are trying to figure out the XDR space.

πŸ“– Read

via "Tech Republic".
❌ No More Ransom Saves Victims Nearly €1 Over 5 Years ❌

No More Ransom is collecting decryptors so ransomware victims don’t have to pay to get their data back and attackers don’t get rich.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-32748 β€Ό

Nextcloud Richdocuments in an open source self hosted online office. Nextcloud uses the WOPI ("Web Application Open Platform Interface") protocol to communicate with the Collabora Editor, the communication between these two services was not protected by a credentials or IP check. Whilst this does not result in gaining access to data that the user has not yet access to, it can result in a bypass of any enforced watermark on documents as described on the [Nextcloud Virtual Data Room](https://nextcloud.com/virtual-data-room/) website and [our documentation](https://portal.nextcloud.com/article/nextcloud-and-virtual-data-room-configuration-59.html). The Nextcloud Richdocuments releases 3.8.3 and 4.2.0 add an additional admin settings for an allowlist of IP addresses that can access the WOPI API. We recommend upgrading and configuring the allowlist to a list of Collabora servers. There is no known workaround. Note that this primarily results a bypass of any configured watermark or download protection using File Access Control. If you do not require or rely on these as a security feature no immediate action is required on your end.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32796 β€Ό

xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. This issue has been resolved in version 0.7.0. As a workaround downstream applications can validate the input and reject the maliciously crafted documents.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32788 β€Ό

Discourse is an open source discussion platform. In versions prior to 2.7.7 there are two bugs which led to the post creator of a whisper post being revealed to non-staff users. 1: Staff users that creates a whisper post in a personal message is revealed to non-staff participants of the personal message even though the whisper post cannot be seen by them. 2: When a whisper post is before the last post in a post stream, deleting the last post will result in the creator of the whisper post to be revealed to non-staff users as the last poster of the topic.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23414 β€Ό

This affects the package video.js before 7.14.3. The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
❌ Podcast: Why Securing Active Directory Is a Nightmare ❌

Researchers preview work to be presented at Black Hat on how AD β€œmisconfiguration debt” lays out a dizzying array of attack paths, such as in PetitPotam.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-32000 β€Ό

A UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean-up.sh script of clone-master-clean-up in SUSE Linux Enterprise Server 12 SP3, SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allows local attackers to delete arbitrary files. This issue affects: SUSE Linux Enterprise Server 12 SP3 clone-master-clean-up version 1.6-4.6.1 and prior versions. SUSE Linux Enterprise Server 15 SP1 clone-master-clean-up version 1.6-3.9.1 and prior versions. openSUSE Factory clone-master-clean-up version 1.6-1.4 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32001 β€Ό

A Missing Encryption of Sensitive Data vulnerability in k3s, kde2 of SUSE Rancher allows any user with direct access to the datastore, or a copy of a datastore backup to extract the cluster's confidential keying material (cluster certificate authority private keys, secrets encryption configuration passphrase, etc) and decrypt it, without having to know the token value. This issue affects: SUSE Rancher K3s version v1.19.12+k3s1, v1.20.8+k3s1, v1.21.2+k3s1 and prior versions; RKE2 version v1.19.12+rke2r1, v1.20.8+rke2r1, v1.21.2+rke2r1 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
🦿 How the Dark Web enables access to corporate networks 🦿

The number of ads selling access to corporate networks has continued to increase from 2019 to 2020 and into 2021, says Positive Technologies.

πŸ“– Read

via "Tech Republic".
❌ Reboot of PunkSpider Tool at DEF CON Stirs Debate ❌

Researchers plan to introduce a revamp of PunkSpider, which helps identify flaws in websites so companies can make their back-end systems more secure, at DEF CON.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-23415 β€Ό

This affects the package elFinder.AspNet before 1.1.1. The user-controlled file name is not properly sanitized before it is used to create a file system path.

πŸ“– Read

via "National Vulnerability Database".