βΌ CVE-2021-29862 βΌ
π Read
via "National Vulnerability Database".
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 206086.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29801 βΌ
π Read
via "National Vulnerability Database".
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the kernel to gain root privileges. IBM X-Force ID: 203977.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29715 βΌ
π Read
via "National Vulnerability Database".
IBM API Connect 5.0.0.0 through 5.0.8.11 could alllow a remote user to obtain sensitive information or conduct denial of serivce attacks due to open ports. IBM X-Force ID: 201018.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29772 βΌ
π Read
via "National Vulnerability Database".
IBM API Connect 5.0.0.0 through 5.0.8.11 could allow a user to potentially inject code due to unsanitized user input. IBM X-Force ID: 202774.π Read
via "National Vulnerability Database".
β Big bad decryption bug in OpenSSL β but no cause for alarm β
π Read
via "Naked Security".
The buggy code's in there, alright. Fortunately, it's hard to get OpenSSL to use it even if you want to, which mitigates the risk.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
βΌ CVE-2021-39167 βΌ
π Read
via "National Vulnerability Database".
OpenZepplin is a library for smart contract development. In affected versions a vulnerability in TimelockController allowed an actor with the executor role to escalate privileges. Further details about the vulnerability will be disclosed at a later date. As a workaround revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39168 βΌ
π Read
via "National Vulnerability Database".
OpenZepplin is a library for smart contract development. In affected versions a vulnerability in TimelockController allowed an actor with the executor role to escalate privileges. Further details about the vulnerability will be disclosed at a later date. As a workaround revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40142 βΌ
π Read
via "National Vulnerability Database".
In OPC Foundation Local Discovery Server (LDS) before 1.04.402.463, remote attackers can cause a denial of service (DoS) by sending carefully crafted messages that lead to Access of a Memory Location After the End of a Buffer.π Read
via "National Vulnerability Database".
β βPay Ransomβ Screen? Too Late, Humpty Dumpty β Podcast β
π Read
via "Threat Post".
Splunkβs Ryan Kovar discusses the rise in supply-chain attacks a la Kaseya & how to get ahead of encryption leaving your business a pile of broken shells. π Read
via "Threat Post".
Threat Post
βPay Ransomβ Screen? Too Late, Humpty Dumpty β Podcast
Splunkβs Ryan Kovar discusses the rise in supply-chain attacks a la Kaseya & how to get ahead of encryption leaving your business a pile of broken shells.
β Top Strategies That Define the Success of a Modern Vulnerability Management Program β
π Read
via "Threat Post".
Modern vulnerability management programs require a strategy that defines what success means for your organizationβs cybersecurity goals. By incorporating a few simple cyber hygiene routines to your daily security routine, youβll set up your IT teams to be better equipped to steer off cyberattacks.π Read
via "Threat Post".
Threat Post
Top Strategies That Define the Success of a Modern Vulnerability Management Program
Modern vulnerability management programs require a strategy that defines what success means for your organizationβs cybersecurity goals. By incorporating a few simple cyber hygiene routines to your daily security routine, youβll set up your IT teams to beβ¦
βΌ CVE-2021-39169 βΌ
π Read
via "National Vulnerability Database".
Misskey is a decentralized microblogging platform. In versions of Misskey prior to 12.51.0, malicious actors can use the web client built-in dialog to display a malicious string, leading to cross-site scripting (XSS). XSS could compromise the API request token. This issue has been fixed in version 12.51.0. There are no known workarounds aside from upgrading.π Read
via "National Vulnerability Database".
β Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor β
π Read
via "Threat Post".
The cybercriminal group, active since late 2019, has closed its doors and released the key to unlocking victimsβ files on its dark web portal.π Read
via "Threat Post".
Threat Post
Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor
The cybercriminal group, active since late 2019, has closed its doors and released the key to unlocking victimsβ files on its dark web portal.
π¦Ώ "Intruders" in the cloud: Microsoft warns "thousands" of customers about potential exposure π¦Ώ
π Read
via "Tech Republic".
On Thursday, the company sent warnings to "thousands" of its cloud computing customers, explaining that "intruders" could have access to Microsoft Azure's Cosmos DB databases, according to Reuters.π Read
via "Tech Republic".
βΌ CVE-2021-40153 βΌ
π Read
via "National Vulnerability Database".
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.π Read
via "National Vulnerability Database".
β Critical Azure Cosmos DB Bug Allows Full Cloud Account Takeover β
π Read
via "Threat Post".
It's unclear if Microsoft customers were breached during the months-long period where the #ChaosDB bug in Jupyter Notebooks was exploitable.π Read
via "Threat Post".
Threat Post
Critical Azure Cosmos DB Bug Allows Full Cloud Account Takeover
It's unclear if Microsoft customers were breached during the months-long period where the #ChaosDB bug in Jupyter Notebooks was exploitable.
π Friday Five 8/27 π
π Read
via "".
Tech companies pledge billions to bolster security, a ransomware group shuts down, and the top data breach culprits - catch up on the infosec news of the week with the Friday Five!π Read
via "".
Digital Guardian
Friday Five 8/27
Tech companies pledge billions to bolster security, a ransomware group shuts down, and the top data breach culprits - catch up on the infosec news of the week with the Friday Five!
β FIN8 Targets US Bank With New βSardonicβ Backdoor β
π Read
via "Threat Post".
The latest refinement of the APT's BadHatch backdoor can leverage new malware on the fly without redeployment, making it potent and nimble.π Read
via "Threat Post".
Threat Post
FIN8 Targets US Bank With New βSardonicβ Backdoor
The latest refinement of the APT's BadHatch backdoor can leverage new malware on the fly without redeployment, making it potent and nimble.
π¦Ώ Top 10 tech and health jobs with the best pay and growth potential π¦Ώ
π Read
via "Tech Republic".
A new analysis shows that infosec analysts, sysadmins and network architects will see the most growth over the next decade.π Read
via "Tech Republic".
TechRepublic
Top 10 tech and health jobs with the best pay and growth potential
A new analysis shows that infosec analysts, sysadmins and network architects will see the most growth over the next decade.
βΌ CVE-2021-36530 βΌ
π Read
via "National Vulnerability Database".
ngiflib 0.4 has a heap overflow in GetByteStr() at ngiflib.c:108 in NGIFLIB_NO_FILE mode, GetByteStr() copy memory buffer without checking the boundary.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36531 βΌ
π Read
via "National Vulnerability Database".
ngiflib 0.4 has a heap overflow in GetByte() at ngiflib.c:70 in NGIFLIB_NO_FILE mode, GetByte() reads memory buffer without checking the boundary.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29744 βΌ
π Read
via "National Vulnerability Database".
IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 201694.π Read
via "National Vulnerability Database".