πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-20128 β€Ό

The Profile Name field in the floor plan (Network Menu) page in Draytek VigorConnect 1.6.0-B3 was found to be vulnerable to stored XSS, as user input is not properly sanitized.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41138 β€Ό

Frontier is Substrate's Ethereum compatibility layer. In the newly introduced signed Frontier-specific extrinsic for `pallet-ethereum`, a large part of transaction validation logic was only called in transaction pool validation, but not in block execution. Malicious validators can take advantage of this to put invalid transactions into a block. The attack is limited in that the signature is always validated, and the majority of the validation is done again in the subsequent `pallet-evm` execution logic. However, do note that a chain ID replay attack was possible. In addition, spamming attacks are of main concerns, while they are limited by Substrate block size limits and other factors. The issue is patched in commit `146bb48849e5393004be5c88beefe76fdf009aba`.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41139 β€Ό

Anuko Time Tracker is an open source, web-based time tracking application written in PHP. When a logged on user selects a date in Time Tracker, it is being passed on via the date parameter in URI. Because of not checking this parameter for sanity in versions prior to 1.19.30.5600, it was possible to craft the URI with malicious JavaScript, use social engineering to convince logged on user to click on such link, and have the attacker-supplied JavaScript to be executed in user's browser. This issue is patched in version 1.19.30.5600. As a workaround, one may introduce `ttValidDbDateFormatDate` function as in the latest version and add a call to it within the access checks block in time.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20123 β€Ό

A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Microsoft Fends Off 2.4 Tbps DDoS Attack πŸ”

The attack was reportedly 140 percent higher than a 1 Tbps attack it saw in 2020 and higher than any network volumetric event the company previously detected.

πŸ“– Read

via "".
πŸ•΄ Are You Ready for the Privacy Laws Tsunami? πŸ•΄

Think PCI, HIPAA, and GDPR compliance is tough? There's a tsunami of similar laws on the way. Prepare your business for success with privacy by design.

πŸ“– Read

via "Dark Reading".
❌ FreakOut Botnet Turns DVRs Into Monero Cryptominers ❌

The new Necro Python exploit targets Visual Tool DVRs used in surveillance systems.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-42224 β€Ό

SQL Injection vulnerability exists in IFSC Code Finder Project 1.0 via the searchifsccode POST parameter in /search.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26318 β€Ό

A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20130 β€Ό

ManageEngine ADManager Plus Build 7111 contains a post-authentication remote code execution vulnerability due to improperly validated file uploads in the PasswordExpiry interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20131 β€Ό

ManageEngine ADManager Plus Build 7111 contains a post-authentication remote code execution vulnerability due to improperly validated file uploads in the Personalization interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40842 β€Ό

Proofpoint Insider Threat Management Server contains a SQL injection vulnerability in the Web Console. The vulnerability exists due to improper input validation on the database name parameter required in certain unauthenticated APIs. A malicious URL visited by anyone with network access to the server could be used to blindly execute arbitrary SQL statements on the backend database. Version 7.12.0 and all versions prior to 7.11.2 are affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40843 β€Ό

Proofpoint Insider Threat Management Server contains an unsafe deserialization vulnerability in the Web Console. An attacker with write access to the local database could cause arbitrary code to execute with SYSTEM privileges on the underlying server when a Web Console user triggers retrieval of that data. When chained with a SQL injection vulnerability, the vulnerability could be exploited remotely if Web Console users click a series of maliciously crafted URLs. All versions prior to 7.11.2 are affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42223 β€Ό

Cross Site Scripting (XSS).vulnerability exists in Online DJ Booking Management System 1.0 in view-booking-detail.php.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to get the most bang for your buck out of your cybersecurity budget 🦿

More than a quarter of executives surveyed by PwC expect double-digit growth in security budgets in 2022. The trick is to spend that money wisely and effectively.

πŸ“– Read

via "Tech Republic".
πŸ•΄ What Does a Chief Product Security Officer Do? πŸ•΄

A CPSO bridges the gap between developers and security to ensure products are built securely and safely.

πŸ“– Read

via "Dark Reading".
πŸ•΄ VirusTotal Shares Data on Ransomware Activity πŸ•΄

Google's online malware scanning service analyzed 80 million ransomware samples that were uploaded in the past year-and-a-half.

πŸ“– Read

via "Dark Reading".
🦿 3 risk management priorities CIOs are focused on right now 🦿

CIOs have had their hands full since the start of the pandemic with three risk management and governance priorities weighing heavily on their minds.

πŸ“– Read

via "Tech Republic".
🦿 Has COVID-19 or supply chain issues affected your organization's cybersecurity plans? 🦿

What do you really think about your company's cybersecurity strategy? Take this quick, multiple choice survey and tell us.

πŸ“– Read

via "Tech Republic".
πŸ•΄ SonicWall Secures Mix of Cloud, Hybrid and Traditional Networks πŸ•΄

Company’s virtual offerings, cloud services match with on-premises deployments to solve real-world security challenges for SMBs, enterprises, governments, and MSSPs.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Fugue Adds Kubernetes Security Checks to Secure Infrastructure-As-Code πŸ•΄

Developers can apply proper security controls as they programmatically deploy Kubernetes clusters.

πŸ“– Read

via "Dark Reading".