πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-22948 β€Ό

Vulnerability in the generation of session IDs in revive-adserver < 5.3.0, based on the cryptographically insecure uniqid() PHP function. Under some circumstances, an attacker could theoretically be able to brute force session IDs in order to take over a specific account.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22012 β€Ό

The vCenter Server contains an information disclosure vulnerability due to an unauthenticated appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22005 β€Ό

The vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22941 β€Ό

Improper Access Control in Citrix ShareFile storage zones controller before 5.11.20 may allow an unauthenticated attacker to remotely compromise the storage zones controller.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21993 β€Ό

The vCenter Server contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in vCenter Server Content Library. An authorised user with access to content library may exploit this issue by sending a POST request to vCenter Server leading to information disclosure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22008 β€Ό

The vCenter Server contains an information disclosure vulnerability in VAPI (vCenter API) service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue by sending a specially crafted json-rpc message to gain access to sensitive information.

πŸ“– Read

via "National Vulnerability Database".
❌ FamousSparrow APT Wings in to Spy on Hotels, Governments ❌

A custom "SparrowDoor" backdoor has allowed the attackers to collect data from targets around the globe.

πŸ“– Read

via "Threat Post".
🦿 Ransomware now accounts for 69% of all attacks that use malware 🦿

The most common targets of ransomware in the second quarter of 2021 were governmental, medical and industrial companies along with scientific and educational institutions, says Positive Technologies.

πŸ“– Read

via "Tech Republic".
🦿 How to secure SSH logins with port knocking 🦿

Knock, knock ... who's there? SSH. SSH who? You need to lock down your servers so that only you have access via SSH. One way to help that is with knockd. Jack Wallen shows you how.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Fake WhatsApp backup message delivers malware to Spanish speakers’ devices πŸ—“οΈ

The trojan horse in Spain is nothing but a pain

πŸ“– Read

via "The Daily Swig".
πŸ›  Zeek 4.0.4 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
🦿 How phishing-as-a-service operations pose a threat to organizations 🦿

Attackers can easily buy, deploy and scale phishing campaigns to steal credentials and other sensitive data, says Microsoft.

πŸ“– Read

via "Tech Republic".
🦿 Ransomware detections dropped by almost half, but the threat is only getting worse, says Trend Micro 🦿

Rather than indicating ransomware was a passing fad, the decrease in attack volume shows that attackers are starting to become more opportunistic and smarter about picking targets.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-32963 β€Ό

Null pointer dereference in SuiteLink server while processing commands 0x03/0x10

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32959 β€Ό

Heap-based buffer overflow in SuiteLink server while processing commands 0x05/0x06

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32979 β€Ό

Null pointer dereference in SuiteLink server while processing commands 0x04/0x0a

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41381 β€Ό

Payara Micro Community 5.2021.6 and below allows Directory Traversal.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26750 β€Ό

DLL hijacking in Panda Agent <=1.16.11 in Panda Security, S.L.U. Panda Adaptive Defense 360 <= 8.0.17 allows attacker to escalate privileges via maliciously crafted DLL file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32999 β€Ό

Improper handling of exceptional conditions in SuiteLink server while processing command 0x01

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41428 β€Ό

Insecure permissions in Update Manager <= 5.8.0.2300 and DFL <= 12.5.1001.5 in DATEV programs v14.1 allows attacker to escalate privileges via insufficient configuration of service components.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21913 β€Ό

An information disclosure vulnerability exists in the WiFi Smart Mesh functionality of D-LINK DIR-3040 1.13B03. A specially-crafted network request can lead to command execution. An attacker can connect to the MQTT service to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".