πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Ransomware Attacks on Agriculture Industry Increase πŸ”

Two attacks on farming co-ops in the midwest have corroborated a warning from the FBI that when it comes to ransomware attacks, the agricultural industry is on watch .

πŸ“– Read

via "".
πŸ•΄ 7 Ways to Thwart Malicious Insiders πŸ•΄

Malicious insider incidents are less frequent than inadvertent user missteps, but they can cost organizations big time.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Thoma Bravo Completes Strategic Investment in Intel 471 πŸ•΄

Intel 471 is a provider of cyber threat intelligence for leading enterprises and governments.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-41097 β€Ό

aurelia-path is part of the Aurelia platform and contains utilities for path manipulation. There is a prototype pollution vulnerability in aurelia-path before version 1.1.7. The vulnerability exposes Aurelia application that uses `aurelia-path` package to parse a string. The majority of this will be Aurelia applications that employ the `aurelia-router` package. An example is this could allow an attacker to change the prototype of base object class `Object` by tricking an application to parse the following URL: `https://aurelia.io/blog/?__proto__[asdf]=asdf`. The problem is patched in version `1.1.7`.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20035 β€Ό

Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user which potentially leads to DoS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20034 β€Ό

An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.

πŸ“– Read

via "National Vulnerability Database".
❌ 5 Steps to Securing Your Network Perimeter ❌

Ekaterina Kilyusheva, head of the Information Security Analytics Research Group at Positive Technologies, offers a blueprint for locking up the fortress.

πŸ“– Read

via "Threat Post".
πŸ•΄ Microsoft Warns of 'FoggyWeb' Malware Targeting AD FS Servers πŸ•΄

The group tracked as Nobelium uses multiple tactics to steal credentials with the goal of gaining admin access to Active Directory Federation Services.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft Adds Emergency Threat Mitigation to its Exchange Server Software πŸ•΄

The built-in service automates mitigations to known Exchange Server threats.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-37270 β€Ό

There is an unauthorized access vulnerability in the CMS Enterprise Website Construction System 5.0. Attackers can use this vulnerability to directly access the specified background path without logging in to the background to obtain the background administrator authority.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41096 β€Ό

Rucky is a USB HID Rubber Ducky Launch Pad for Android. Versions 2.2 and earlier for release builds and versions 425 and earlier for nightly builds suffer from use of a weak cryptographic algorithm (RSA/ECB/PKCS1Padding). The issue will be patched in v2.3 for release builds and 426 onwards for nightly builds. As a workaround, one may disable an advance security feature if not required.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41095 β€Ό

Discourse is an open source discussion platform. There is a cross-site scripting (XSS) vulnerability in versions 2.7.7 and earlier of the `stable` branch, versions 2.8.0.beta6 and earlier of the `beta` branch, and versions 2.8.0.beta6 and earlier of the `tests-passed` branch. Rendering of some error messages that contain user input can be susceptible to XSS attacks. This vulnerability only affects sites which have blocked watched words that contain HTML tags, modified or disabled Discourse's default Content Security Policy. This issue is patched in the latest `stable`, `beta` and `tests-passed` versions of Discourse. As a workaround, avoid modifying or disabling DiscourseΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s default Content Security Policy, and blocking watched words containing HTML tags.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37274 β€Ό

Kingdee KIS Professional Edition has a privilege escalation vulnerability. Attackers can use the vulnerability to gain computer administrator rights via unspecified loopholes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24930 β€Ό

Beijing Wuzhi Internet Technology Co., Ltd. Wuzhi CMS 4.0.1 is an open source content management system. The five fingers CMS backend in***.php file has arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41098 β€Ό

Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser. JRuby users should upgrade to Nokogiri v1.12.5 or later to receive a patch for this issue. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ CISA: Wide Exploitation of New VMware vCenter Server Flaw Likely πŸ•΄

Attackers can use the vulnerability to remotely execute arbitrary code.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-20695 β€Ό

A stored cross-site scripting (XSS) vulnerability in GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20696 β€Ό

A cross-site scripting (XSS) vulnerability in /admin/content/post of GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Tags field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20692 β€Ό

GilaCMS v1.11.4 was discovered to contain a SQL injection vulnerability via the $_GET parameter in /src/core/controllers/cm.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20693 β€Ό

A Cross-Site Request Forgery (CSRF) in GilaCMS v1.11.4 allows authenticated attackers to arbitrarily add administrator accounts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20691 β€Ό

An issue in Monstra CMS v3.0.4 allows attackers to execute arbitrary web scripts or HTML via bypassing the file extension filter and uploading crafted HTML files.

πŸ“– Read

via "National Vulnerability Database".