β Critical Azure Cosmos DB Bug Allows Full Cloud Account Takeover β
π Read
via "Threat Post".
It's unclear if Microsoft customers were breached during the months-long period where the #ChaosDB bug in Jupyter Notebooks was exploitable.π Read
via "Threat Post".
Threat Post
Critical Azure Cosmos DB Bug Allows Full Cloud Account Takeover
It's unclear if Microsoft customers were breached during the months-long period where the #ChaosDB bug in Jupyter Notebooks was exploitable.
π Friday Five 8/27 π
π Read
via "".
Tech companies pledge billions to bolster security, a ransomware group shuts down, and the top data breach culprits - catch up on the infosec news of the week with the Friday Five!π Read
via "".
Digital Guardian
Friday Five 8/27
Tech companies pledge billions to bolster security, a ransomware group shuts down, and the top data breach culprits - catch up on the infosec news of the week with the Friday Five!
β FIN8 Targets US Bank With New βSardonicβ Backdoor β
π Read
via "Threat Post".
The latest refinement of the APT's BadHatch backdoor can leverage new malware on the fly without redeployment, making it potent and nimble.π Read
via "Threat Post".
Threat Post
FIN8 Targets US Bank With New βSardonicβ Backdoor
The latest refinement of the APT's BadHatch backdoor can leverage new malware on the fly without redeployment, making it potent and nimble.
π¦Ώ Top 10 tech and health jobs with the best pay and growth potential π¦Ώ
π Read
via "Tech Republic".
A new analysis shows that infosec analysts, sysadmins and network architects will see the most growth over the next decade.π Read
via "Tech Republic".
TechRepublic
Top 10 tech and health jobs with the best pay and growth potential
A new analysis shows that infosec analysts, sysadmins and network architects will see the most growth over the next decade.
βΌ CVE-2021-36530 βΌ
π Read
via "National Vulnerability Database".
ngiflib 0.4 has a heap overflow in GetByteStr() at ngiflib.c:108 in NGIFLIB_NO_FILE mode, GetByteStr() copy memory buffer without checking the boundary.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36531 βΌ
π Read
via "National Vulnerability Database".
ngiflib 0.4 has a heap overflow in GetByte() at ngiflib.c:70 in NGIFLIB_NO_FILE mode, GetByte() reads memory buffer without checking the boundary.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29744 βΌ
π Read
via "National Vulnerability Database".
IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 201694.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23434 βΌ
π Read
via "National Vulnerability Database".
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.π Read
via "National Vulnerability Database".
π¦Ώ Ransomware demands and payments skyrocket π¦Ώ
π Read
via "Tech Republic".
According to a ransomware report, the average ransom payment in the first half of 2021 jumped to $570,000. Learn more in TechRepublic's Karen Roby interview with writer Lance Whitney.π Read
via "Tech Republic".
TechRepublic
Ransomware demands and payments reach new highs
As cybercriminals have become more aggressive, the average ransom payment in the first half of 2021 jumped to $570,000, up 82% from 2020, says Palo Alto Networks' Unit 42.
π¦Ώ How malicious Android apps use social engineering tactics to access Facebook accounts π¦Ώ
π Read
via "Tech Republic".
Learn how Android users can protect themselves against such malicious apps.π Read
via "Tech Republic".
TechRepublic
Malicious Android apps try to hijack your Facebook account
These apps attempt to capture such Facebook data as your ID, location, IP address and associated cookies, says Zimperium.
βΌ CVE-2021-28695 βΌ
π Read
via "National Vulnerability Database".
IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).π Read
via "National Vulnerability Database".
βΌ CVE-2020-18999 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) in Blog_mini v1.0 allows remote attackers to execute arbitrary code via the component '/admin/submit-articles'.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28233 βΌ
π Read
via "National Vulnerability Database".
Heap-based Buffer Overflow vulnerability exists in ok-file-formats 1 via the ok_jpg_generate_huffman_table function in ok_jpg.c.π Read
via "National Vulnerability Database".
βΌ CVE-2021-3264 βΌ
π Read
via "National Vulnerability Database".
SQL Injection vulnerability in cxuucms 3.1 ivia the pid parameter in public/admin.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28697 βΌ
π Read
via "National Vulnerability Database".
grant table v2 status pages may remain accessible after de-allocation Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, get de-allocated when a guest switched (back) from v2 to v1. The freeing of such pages requires that the hypervisor know where in the guest these pages were mapped. The hypervisor tracks only one use within guest space, but racing requests from the guest to insert mappings of these pages may result in any of them to become mapped in multiple locations. Upon switching back from v2 to v1, the guest would then retain access to a page that was freed and perhaps re-used for other purposes.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28696 βΌ
π Read
via "National Vulnerability Database".
IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).π Read
via "National Vulnerability Database".
βΌ CVE-2020-19002 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) in Mezzanine v4.3.1 allows remote attackers to execute arbitrary code via the 'Description' field of the component 'admin/blog/blogpost/add/'. This issue is different than CVE-2018-16632.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28699 βΌ
π Read
via "National Vulnerability Database".
inadequate grant-v2 status frames array bounds check The v2 grant table interface separates grant attributes from grant status. That is, when operating in this mode, a guest has two tables. As a result, guests also need to be able to retrieve the addresses that the new status tracking table can be accessed through. For 32-bit guests on x86, translation of requests has to occur because the interface structure layouts commonly differ between 32- and 64-bit. The translation of the request to obtain the frame numbers of the grant status table involves translating the resulting array of frame numbers. Since the space used to carry out the translation is limited, the translation layer tells the core function the capacity of the array within translation space. Unfortunately the core function then only enforces array bounds to be below 8 times the specified value, and would write past the available space if enough frame numbers needed storing.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19001 βΌ
π Read
via "National Vulnerability Database".
Command Injection in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary system commands via line 64 of the component 'simiki/blob/master/simiki/config.py'.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28694 βΌ
π Read
via "National Vulnerability Database".
IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).π Read
via "National Vulnerability Database".
βΌ CVE-2021-28700 βΌ
π Read
via "National Vulnerability Database".
xen/arm: No memory limit for dom0less domUs The dom0less feature allows an administrator to create multiple unprivileged domains directly from Xen. Unfortunately, the memory limit from them is not set. This allow a domain to allocate memory beyond what an administrator originally configured.π Read
via "National Vulnerability Database".