πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Mandating a Zero-Trust Approach for Software Supply Chains ❌

Sounil Yu, CISO at JupiterOne, discusses software bills of materials (SBOMs) and the need for a shift in thinking about securing software supply chains.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ β€˜Find out what sparks joy’ – YouTube educator and security expert Katie Paxton-Fear on carving out a successful infosec career πŸ—“οΈ

β€˜Never stop learning’, Swig readers told during Q&A session

πŸ“– Read

via "The Daily Swig".
πŸ•΄ A Close Look at Russia's Ghostwriter Campaign πŸ•΄

The group, which conducts espionage and sows disinformation, is larger than previously thought and has shifted tactics.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ How Coinbase Phishers Steal One-Time Passwords β™ŸοΈ

A recent phishing campaign targeting Coinbase users shows thieves are getting cleverer about phishing one-time passwords (OTPs) needed to complete the login process. It also shows that phishers are attempting to sign up for new Coinbase accounts by the millions as part of an effort to identify email addresses that are already associated with active accounts.

πŸ“– Read

via "Krebs on Security".
🦿 Securing Microsoft 365 with app governance 🦿

How can you protect your network and data from consent phishing attacks? Microsoft's new app compliance program can help.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Corelight Unveils Corelight Labs, a Hub for Research and Innovation πŸ•΄

Company expands its research expertise with addition of AI and security operations experts from its PatternEx acquisition to the Labs team.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Unresolved GitHub Actions flaw allows code to be approved without review πŸ—“οΈ

Mitigations are available for yet-to-be-fixed vulnerability

πŸ“– Read

via "The Daily Swig".
❌ Brizy WordPress Plugin Exploit Chains Allow Full Site Takeovers ❌

A stored XSS and arbitrary file-upload bug can be paired with an authorization bypass to wreak havoc.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-34814 β€Ό

Proofpoint Spam Engine before 8.12.0-2106240000 has a Security Control Bypass.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41137 β€Ό

Minio is a Kubernetes native application for cloud storage. All users on release `RELEASE.2021-10-10T16-53-30Z` are affected by a vulnerability that involves bypassing policy restrictions on regular users. Normally, checkKeyValid() should return owner true for rootCreds. In the affected version, policy restriction did not work properly for users who did not have service (svc) or security token service (STS) accounts. This issue is fixed in `RELEASE.2021-10-13T00-23-17Z`. A downgrade back to release `RELEASE.2021-10-08T23-58-24Z` is available as a workaround.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39304 β€Ό

Proofpoint Enterprise Protection before 8.12.0-2108090000 allows security control bypass.

πŸ“– Read

via "National Vulnerability Database".
🦿 Dark Web: Many cybercrime services sell for less than $500 🦿

A ransomware kit costs as little as $66, though it needs to be modified, while a spearphishing attack can run as low as $100, says Altas VPN.

πŸ“– Read

via "Tech Republic".
⚠ Apple quietly patches yet another iPhone 0-day – check you have 15.0.2 ⚠

Oops!... They did it again.

πŸ“– Read

via "Naked Security".
⚠ Romance scams with a cryptocurrency twist – new research from SophosLabs ⚠

Romance scams and dating site treachery with a new twist - "there's an app for that!"

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-22036 β€Ό

VMware vRealize Orchestrator ((8.x prior to 8.6) contains an open redirect vulnerability due to improper path handling. A malicious actor may be able to redirect victim to an attacker controlled domain due to improper path handling in vRealize Orchestrator leading to sensitive information disclosure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22035 β€Ό

VMware vRealize Log Insight (8.x prior to 8.6) contains a CSV(Comma Separated Value) injection vulnerability in interactive analytics export function. An authenticated malicious actor with non-administrative privileges may be able to embed untrusted data prior to exporting a CSV sheet through Log Insight which could be executed in user's environment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22033 β€Ό

Releases prior to VMware vRealize Operations 8.6 contain a Server Side Request Forgery (SSRF) vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20125 β€Ό

An arbitrary file upload and directory traversal vulnerability exists in the file upload functionality of DownloadFileServlet in Draytek VigorConnect 1.6.0-B3. An unauthenticated attacker could leverage this vulnerability to upload files to any location on the target operating system with root privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40732 β€Ό

XMP Toolkit version 2020.1 (and earlier) is affected by a null pointer dereference vulnerability that could result in leaking data from certain memory locations and causing a local denial of service in the context of the current user. User interaction is required to exploit this vulnerability in that the victim will need to open a specially crafted MXF file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20124 β€Ό

A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3057 β€Ό

A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux.

πŸ“– Read

via "National Vulnerability Database".