π DOJ Aims to Keep Companies Accountable with Cyber-Fraud Initiative π
π Read
via "".
Companies that fail to follow required cybersecurity standards could soon be a target under the DOJ's new Civil Cyber-Fraud Initiative.π Read
via "".
Digital Guardian
DOJ Aims to Keep Companies Accountable with Cyber-Fraud Initiative
Companies that fail to follow required cybersecurity standards could soon be a target under the DOJ's new Civil Cyber-Fraud Initiative.
π΄ NSA, FBI, CISA Issue Advisory on 'BlackMatter' Ransomware π΄
π Read
via "Dark Reading".
Ransomware has become a "national security issue," NSA director said.π Read
via "Dark Reading".
Dark Reading
NSA, FBI, CISA Issue Advisory on 'BlackMatter' Ransomware
Ransomware has become a "national security issue," NSA director said.
β Sinclair Confirms Ransomware Attack That Disrupted TV Stations β
π Read
via "Threat Post".
A major cyberattack resulted in data being stolen, too, but Sinclair's not sure which information is now in the hands of the crooks.π Read
via "Threat Post".
Threat Post
Sinclair Confirms Ransomware Attack That Disrupted TV Stations
A major cyberattack resulted in data being stolen, too, but Sinclair's not sure which information is now in the hands of the crooks.
π¦Ώ Gartner analyst: 12 technologies to accelerate growth, engineer trust and sculpt change in 2022 π¦Ώ
π Read
via "Tech Republic".
CIOs must prioritize the same business imperatives and find the IT force multipliers to enable growth and innovation, according to a Gartner analyst during Gartner's IT Symposium.π Read
via "Tech Republic".
TechRepublic
Gartner analyst: 12 technologies to accelerate growth, engineer trust and sculpt change in 2022
CIOs must prioritize the same business imperatives and find the IT force multipliers to enable growth and innovation, according to a Gartner analyst during Gartner's IT Symposium.
β Podcast: Could the Zoho Flaw Trigger SolarWinds 2.0? β
π Read
via "Threat Post".
Companies are worried that the highly privileged password app could let attackers deep inside an enterpriseβs footprint, says Redscanβs George Glass.π Read
via "Threat Post".
π¦Ώ How to deal with supply-chain disruptions: 5 tips π¦Ώ
π Read
via "Tech Republic".
Tom Merritt gives us five ways to deal with the uncertainty of weather events and port issues.π Read
via "Tech Republic".
TechRepublic
How to deal with supply-chain disruptions: 5 tips
Tom Merritt gives us five ways to deal with the uncertainty of weather events and port issues.
π¦Ώ Top 5 tips for dealing with supply-chain disruptions π¦Ώ
π Read
via "Tech Republic".
Weather events and port issues have caused major disruptions in the global supply chain. Tom Merritt gives us five ways to deal with it.π Read
via "Tech Republic".
TechRepublic
Top 5 tips for dealing with supply-chain disruptions
Weather events and port issues have caused major disruptions in the global supply chain. Tom Merritt gives us five ways to deal with it.
π΄ Loss Prevention Teams Up With Cybersecurity to Address Retail Fraud π΄
π Read
via "Dark Reading".
As retailers roll out more "buy online, pickup in-store" options, loss prevention professionals are increasingly shifting their attention from in-store theft to e-commerce fraud.π Read
via "Dark Reading".
Dark Reading
Loss Prevention Teams Up With Cybersecurity to Address Retail Fraud
As retailers roll out more fulfillment options, loss prevention professionals are increasingly shifting their attention from in-store theft to e-commerce fraud.
βΌ CVE-2021-41152 βΌ
π Read
via "National Vulnerability Database".
OpenOlat is a web-based e-learning platform for teaching, learning, assessment and communication, an LMS, a learning management system. In affected versions by manipulating the HTTP request an attacker can modify the path of a requested file download in the folder component to point to anywhere on the target system. The attack could be used to read any file accessible in the web root folder or outside, depending on the configuration of the system and the properly configured permission of the application server user. The attack requires an OpenOlat user account or the enabled guest user feature together with the usage of the folder component in a course. The attack does not allow writing of arbitrary files, it allows only reading of files and also only ready of files that the attacker knows the exact path which is very unlikely at least for OpenOlat data files. The problem is fixed in version 15.5.8 and 16.0.1 It is advised to upgrade to version 16.0.x. There are no known workarounds to fix this problem, an upgrade is necessary.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41156 βΌ
π Read
via "National Vulnerability Database".
anuko/timetracker is an, open source time tracking system. In affected versions Time Tracker uses browser_today hidden control on a few pages to collect the today's date from user browsers. Because of not checking this parameter for sanity in versions prior to 1.19.30.5601, it was possible to craft an html form with malicious JavaScript, use social engineering to convince logged on users to execute a POST from such form, and have the attacker-supplied JavaScript to be executed in user's browser. This has been patched in version 1.19.30.5600. Upgrade is recommended. If it is not practical, introduce ttValidDbDateFormatDate function as in the latest version and add a call to it within the access checks block.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42650 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS vulnerability exists in Portainer before 2.9.1 via the node input box in Custom Templates.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41151 βΌ
π Read
via "National Vulnerability Database".
Backstage is an open platform for building developer portals. In affected versions A malicious actor could read sensitive files from the environment where Scaffolder Tasks are run. The attack is executed by crafting a custom Scaffolder template with a `github:publish:pull-request` action and a particular source path. When the template is executed the sensitive files would be included in the published pull request. This vulnerability is mitigated by the fact that an attacker would need access to create and register templates in the Backstage catalog, and that the attack is very visible given that the exfiltration happens via a pull request. The vulnerability is patched in the `0.15.9` release of `@backstage/plugin-scaffolder-backend`.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41153 βΌ
π Read
via "National Vulnerability Database".
The evm crate is a pure Rust implementation of Ethereum Virtual Machine. In `evm` crate `< 0.31.0`, `JUMPI` opcode's condition is checked after the destination validity check. However, according to Geth and OpenEthereum, the condition check should happen before the destination validity check. This is a **high** severity security advisory if you use `evm` crate for Ethereum mainnet. In this case, you should update your library dependency immediately to on or after `0.31.0`. This is a **low** severity security advisory if you use `evm` crate in Frontier or in a standalone blockchain, because there's no security exploit possible with this advisory. It is **not** recommended to update to on or after `0.31.0` until all the normal chain upgrade preparations have been done. If you use Frontier or other `pallet-evm` based Substrate blockchain, please ensure to update your `spec_version` before updating this. For other blockchains, please make sure to follow a hard-fork process before you update this.π Read
via "National Vulnerability Database".
π΄ Group With Potential Links to Iranian Threat Actor Resurfaces π΄
π Read
via "Dark Reading".
The Lyceum group has previously been linked to attacks on targets in the Middle East.π Read
via "Dark Reading".
Dark Reading
Group With Potential Links to Iranian Threat Actor Resurfaces
The Lyceum group has previously been linked to attacks on targets in the Middle East.
π΄ FIDO Alliance Research Tracks Passwordless Authentication as It Moves Mainstream π΄
π Read
via "Dark Reading".
New Online Authentication Barometer from the FIDO Alliance reveals consumer habits, trends and adoption of authentication technologies.π Read
via "Dark Reading".
Dark Reading
FIDO Alliance Research Tracks Passwordless Authentication as It Moves Mainstream
New Online Authentication Barometer from the FIDO Alliance reveals consumer habits, trends and adoption of authentication technologies.
βΌ CVE-2021-41155 βΌ
π Read
via "National Vulnerability Database".
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not sanitize properly user inputs when constructing the SQL query to browse and search revisions in the CVS repositories. The following versions contain the fix: Tuleap Community Edition 11.17.99.146, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41154 βΌ
π Read
via "National Vulnerability Database".
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions an attacker with read access to a "SVN core" repository could execute arbitrary SQL queries. The following versions contain the fix: Tuleap Community Edition 11.17.99.144, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20836 βΌ
π Read
via "National Vulnerability Database".
Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files.π Read
via "National Vulnerability Database".
π΄ 7 Cross-Industry Technology Trends ο»ΏThat Will Disrupt the World π΄
π Read
via "Dark Reading".
Recent McKinsey & Company analysis examines which technologies will have the most momentum in the next ten years. These are the trends security teams need to be aware of in order to protect the organization effectively.π Read
via "Dark Reading".
Dark Reading
7 Cross-Industry Technology Trends ο»ΏThat Will Disrupt the World
Recent McKinsey analysis examines which technologies will have the most momentum in the next 10 years. These are the trends security teams need to know to protect their organizations effectively.
β TA505 Gang Is Back With Newly Polished FlawedGrace RAT β
π Read
via "Threat Post".
TA505 β cybercrime trailblazers with ever-evolving TTPs β have returned to mass-volume email attacks, flashing retooled malware and exotic scripting languages.π Read
via "Threat Post".
Threat Post
TA505 Gang Is Back With Newly Polished FlawedGrace RAT
TA505 β cybercrime trailblazers with ever-evolving TTPs β have returned to mass-volume email attacks, flashing retooled malware and exotic scripting languages.
βΌοΈ CVE-2021-25968 βΌοΈ
via "National Vulnerability Database".
In OpenCMS, versions 10.5.0 to 11.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the Sitemap functionality. These scripts are executed in a victimΓ’β¬β’s browser when they open the page containing the vulnerable field.
π Readvia "National Vulnerability Database".