‼ CVE-2021-33724 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system contains an Arbitrary File Deletion vulnerability that possibly allows to delete an arbitrary file or directory under a user controlled path.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28145 ‼
📖 Read
via "National Vulnerability Database".
Arbitrary file deletion vulnerability was discovered in wuzhicms v 4.0.1 via coreframe\app\attachment\admin\index.php, which allows attackers to access sensitive information.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27395 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability has been identified in SIMATIC Process Historian 2013 and earlier (All versions), SIMATIC Process Historian 2014 (All versions < SP3 Update 6), SIMATIC Process Historian 2019 (All versions), SIMATIC Process Historian 2020 (All versions). An interface in the software that is used for critical functionalities lacks authentication, which could allow a malicious user to maliciously insert, modify or delete data.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-33725 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system allows to delete arbitrary files or directories under a user controlled path and does not correctly check if the relative path is still within the intended target directory.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-33730 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-33733 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application.📖 Read
via "National Vulnerability Database".
🗓️ Chinese phone manufacturer ZTE launches public bug bounty program 🗓️
📖 Read
via "The Daily Swig".
Researchers invited to test for flaws under new YesWeHack platform📖 Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Chinese phone manufacturer ZTE launches public bug bounty program
Researchers invited to test for flaws under new YesWeHack platform
🕴 Not Hitting Your Security KPIs? Get the Whole Business Involved 🕴
📖 Read
via "Dark Reading".
CISOs can deliver better outcomes and get the support they need by linking security processes to business results.📖 Read
via "Dark Reading".
Dark Reading
Not Hitting Your Security KPIs? Get the Whole Business Involved
CISOs can deliver better outcomes and get the support they need by linking security processes to business results.
🕴 RealDefense Completes Fourth Cyber Security Acquisition; Adds STOPzilla to Its Portfolio 🕴
📖 Read
via "Dark Reading".
RealDefense holding company seeks to acquire additional security companies and brands through partnership with Corbel Capital Partners.📖 Read
via "Dark Reading".
Dark Reading
RealDefense Completes Fourth Cyber Security Acquisition; Adds STOPzilla to Its Portfolio
RealDefense holding company seeks to acquire additional security companies and brands through partnership with Corbel Capital Partners.
🕴 Oracle Cloud Joins ONUG Collaborative 🕴
📖 Read
via "Dark Reading".
ONUG Collaborative welcomes new members including Oracle Cloud, Sysdig, Wiz, Intuit, Adobe, Qualys, and F5.📖 Read
via "Dark Reading".
Dark Reading
Oracle Cloud Joins ONUG Collaborative
ONUG Collaborative welcomes new members including Oracle Cloud, Sysdig, Wiz, Intuit, Adobe, Qualys, and F5.
🕴 Palo Alto Networks to Transfer Stock Exchange Listing to Nasdaq 🕴
📖 Read
via "Dark Reading".
Palo Alto Networks anticipates meeting the requirements for inclusion in the NASDAQ-100 index when it rebalances in December.📖 Read
via "Dark Reading".
Dark Reading
Palo Alto Networks to Transfer Stock Exchange Listing to Nasdaq
Palo Alto Networks anticipates meeting the requirements for inclusion in the NASDAQ-100 index when it rebalances in December.
🕴 Kaspersky Updates Industrial Cybersecurity Service 🕴
📖 Read
via "Dark Reading".
Kaspersky Industrial CyberSecurity unlocks centralized management and visibility across entire OT infrastructure.📖 Read
via "Dark Reading".
Dark Reading
Kaspersky Updates Industrial Cybersecurity Service
Kaspersky Industrial CyberSecurity unlocks centralized management and visibility across entire OT infrastructure.
❌ Apple Releases Urgent iOS Updates to Patch New Zero-Day Bug ❌
📖 Read
via "Threat Post".
The bug is under attack. Within hours of the patch release, a researcher published POC code, calling it a "great" flaw that can be used for jailbreaks and local privilege escalation.📖 Read
via "Threat Post".
Threat Post
Apple Releases Urgent iOS Updates to Patch New Zero-Day Bug
The bug is under attack. Within hours of the patch release, a researcher published POC code, calling it a "great" flaw that can be used for jailbreaks and local privilege escalation.
🦿 Remote security: 5 tips 🦿
📖 Read
via "Tech Republic".
Tom Merritt shows us how to be extra safe while more workers than ever before are working from their home offices.📖 Read
via "Tech Republic".
TechRepublic
Remote security: 5 tips
Tom Merritt shows us how to be extra safe while more workers than ever before are working from their home offices.
🦿 Top 5 tips for remote security 🦿
📖 Read
via "Tech Republic".
With more workers at home than ever before, security has become an even bigger concern. Tom Merritt shows us how to be extra safe.📖 Read
via "Tech Republic".
TechRepublic
Top 5 tips for remote security
With more workers at home than ever before, security has become an even bigger concern. Tom Merritt shows us how to be extra safe.
🦿 How to protect your organization from security threats across your supply chain 🦿
📖 Read
via "Tech Republic".
In a survey by BlueVoyant, 97% of people said they've been impacted by a security breach that occurred in their supply chain.📖 Read
via "Tech Republic".
TechRepublic
How to protect your organization from security threats across your supply chain
In a survey by BlueVoyant, 97% of people said they've been impacted by a security breach that occurred in their supply chain.
🗓️ NSA warns of heightened wildcard TLS certificate risk 🗓️
📖 Read
via "The Daily Swig".
Wild Alpaca peril📖 Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
NSA warns of heightened wildcard TLS certificate risk
Wild Alpaca peril
🕴 Google Launches Security Advisory Service, Security to Workspaces 🕴
📖 Read
via "Dark Reading".
Internet giant aims to help companies use the cloud securely and adds more security features to its productivity workspaces to better compete with Microsoft.📖 Read
via "Dark Reading".
Dark Reading
Google Launches Security Advisory Service, Security to Workspaces
Internet giant aims to help companies use the cloud securely and adds more security features to its productivity workspaces to better compete with Microsoft.
‼ CVE-2021-38452 ‼
📖 Read
via "National Vulnerability Database".
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40498 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability has been identified in SAP SuccessFactors Mobile Application for Android - versions older than 2108, which allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service, which can lead to denial of service. The vulnerability is related to Android implementation methods that are widely used across Android mobile applications, and such methods are embedded into the SAP SuccessFactors mobile application. These Android methods begin executing once the user accesses their profile on the mobile application. While executing, it can also pick up the activities from other Android applications that are running in the background of the users device and are using the same types of methods in the application. Such vulnerability can also lead to phishing attacks that can be used for staging other types of attacks.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-38454 ‼
📖 Read
via "National Vulnerability Database".
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.📖 Read
via "National Vulnerability Database".