πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-41301 β€Ό

ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41297 β€Ό

ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated user to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41290 β€Ό

ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41299 β€Ό

ECOA BAS controller is vulnerable to hard-coded credentials within its Linux distribution image, thus remote attackers can obtain administratorÒ€ℒs privilege without logging in.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41729 β€Ό

BaiCloud-cms v2.5.7 is affected by an arbitrary file deletion vulnerability, which allows an attacker to delete arbitrary files on the server through /user/ppsave.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41294 β€Ό

ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files deletion. Using the specific GET parameter, unauthenticated attackers can remotely delete arbitrary files on the affected device and cause denial of service scenario.

πŸ“– Read

via "National Vulnerability Database".
🦿 You can install fail2ban on Rocky Linux and AlmaLinux: Here's how 🦿

If you've yet to install fail2ban on either Rocky Linux or AlmaLinux, Jack Wallen is here to help you out with that.

πŸ“– Read

via "Tech Republic".
❌ The Top Ransomware Threats Aren’t Who You Think ❌

Move over REvil, Ragnar Locker, BlackMatter, Conti et al: Three lesser-known gangs account for the vast majority of ransomware attacks in the U.S. and globally.

πŸ“– Read

via "Threat Post".
πŸ•΄ 5 Ways to Become a Better Cyber-Threat Exterminator πŸ•΄

Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and improve incident response times.

πŸ“– Read

via "Dark Reading".
⚠ How to steal money via Apple Pay using the β€œExpress Transit” feature ⚠

Could a rogue vendor with a dodgy payment terminal rip you off via Apple Pay? Maybe. Here's what to do about it.

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Latest web hacking tools – Q4 2021 πŸ—“οΈ

We take a look at the latest additions to security researchers’ armoury

πŸ“– Read

via "The Daily Swig".
❌ Apple Pay with Visa Hacked to Make Payments via Unlocked iPhones ❌

Researchers have demonstrated that someone could use a stolen, unlocked iPhone to pay for thousands of dollars of goods or services, no authentication needed.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-41720 β€Ό

A command injection vulnerability in Lodash in 4.17.21 allows attackers to arbitrary code execution via the template function. NOTE: this is a different parameter, method, and version than CVE-2021-23337.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41109 β€Ό

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to version 4.10.4, for regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload. A patch in version 4.10.4 removes session tokens from the LiveQuery payload. As a workaround, set `user.acl(new Parse.ACL())` in a beforeSave trigger to make the user private already on sign-up.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21089 β€Ό

Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to locally escalate privileges in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Bug Bounty Radar // The latest bug bounty programs for October 2021 πŸ—“οΈ

New web targets for the discerning hacker

πŸ“– Read

via "The Daily Swig".
πŸ•΄ The New Security Basics: 10 Most Common Defensive Actions πŸ•΄

Companies now commonly collect security metrics from their software development life cycle, implement basic security measures, and define their obligations to protect user data as part of a basic security strategy.

πŸ“– Read

via "Dark Reading".
⚠ How to steal money via Apple Pay using the β€œExpress Transit” feature ⚠

Could a rogue vendor with a dodgy payment terminal rip you off via Apple Pay? Maybe. Here's what to do about it.

πŸ“– Read

via "Naked Security".
⚠ S3 Ep52: Let’s Encrypt, Outlook leak, and VMware exploit [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ›  Haveged 1.9.15 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Read

via "Packet Storm Security".
❌ Innovative Proxy Phantom ATO Fraud Ring Haunts eCommerce Accounts ❌

The group uses millions of password combos at the rate of nearly 2,700 login attempts per minute with new techniques that push the ATO envelope.

πŸ“– Read

via "Threat Post".