๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.9K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ•ด MITRE Engenuity Announces ATT&CKยฎ Evaluations Call for Participation for Managed Services ๐Ÿ•ด

Offering to provide transparency into the capabilities of managed security service providers and and managed detection and response competencies.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Google: Phishing Campaign Targets YouTube Creators ๐Ÿ•ด

The attackers behind the campaign, which distributes cookie theft malware, are attributed to actors recruited in a Russian-speaking forum.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด CISA Awards $2 Million to Bring Cybersecurity Training to Rural Communities and Diverse Populations ๐Ÿ•ด

Award recipients NPower and CyberWarrior recognized for development of cyber workforce training programs.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Microsoft, Intel, and Goldman Sachs to Lead New TCG Work Group to Tackle Supply Chain Security Challenges ๐Ÿ•ด

Led by representatives from the three companies, the work group will create guidance that defines, implements, and upholds security standards for the entire supply chain.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Optiv Announces Second Annual $40,000 Scholarship for Black, African American Identifying STEM Students ๐Ÿ•ด

$10,000 to be awarded annually for four years each by Optivโ€™s Black Employee Network.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Microsoft-Signed Rootkit Targets Gaming Environments in China ๐Ÿ•ด

FiveSys is the second publicly known rootkit since June that attackers have managed to sneak past Microsoft's driver certification process.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2021-42771 โ€ผ

Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-42765 โ€ผ

The Proof-of-Stake (PoS) Ethereum consensus protocol through 2021-10-19 allows an adversary to leverage network delay to cause a denial of service (indefinite stalling of consensus decisions).

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-42766 โ€ผ

The Proof-of-Stake (PoS) Ethereum consensus protocol through 2021-10-19 allows an adversary to cause a denial of service (long-range consensus chain reorganizations), even when this adversary has little stake and cannot influence network message propagation. This can cause a protocol stall, or an increase in the profits of individual validators.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-42764 โ€ผ

The Proof-of-Stake (PoS) Ethereum consensus protocol through 2021-10-19 allows an adversary to cause a denial of service (delayed consensus decisions), and also increase the profits of individual validators, via short-range reorganizations of the underlying consensus chain.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-40121 โ€ผ

Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34736 โ€ผ

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to cause the web-based management interface to unexpectedly restart. The vulnerability is due to insufficient input validation on the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause the interface to restart, resulting in a denial of service (DoS) condition.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-39126 โ€ผ

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to modify various resources via a Cross-Site Request Forgery (CSRF) vulnerability, following an Information Disclosure vulnerability in the referrer headers which discloses a user's CSRF token. The affected versions are before version 8.5.10, and from version 8.6.0 before 8.13.2.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-42096 โ€ผ

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34760 โ€ผ

A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34789 โ€ผ

A vulnerability in the web-based management interface of Cisco Tetration could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack on an affected system. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-39127 โ€ผ

Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to the query component JQL endpoint via a Broken Access Control vulnerability (BAC) vulnerability. The affected versions are before version 8.5.10, and from version 8.6.0 before 8.13.1.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-40122 โ€ผ

A vulnerability in an API of the Call Bridge feature of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper handling of large series of message requests. An attacker could exploit this vulnerability by sending a series of messages to the vulnerable API. A successful exploit could allow the attacker to cause the affected device to reload, dropping all ongoing calls and resulting in a DoS condition.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34743 โ€ผ

A vulnerability in the application integration feature of Cisco Webex Software could allow an unauthenticated, remote attacker to authorize an external application to integrate with and access a user's account without that user's express consent. This vulnerability is due to improper validation of cross-site request forgery (CSRF) tokens. An attacker could exploit this vulnerability by convincing a targeted user who is currently authenticated to Cisco Webex Software to follow a link designed to pass malicious input to the Cisco Webex Software application authorization interface. A successful exploit could allow the attacker to cause Cisco Webex Software to authorize an application on the user's behalf without the express consent of the user, possibly allowing external applications to read data from that user's profile.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-1529 โ€ผ

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2021-34738 โ€ผ

Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory.

๐Ÿ“– Read

via "National Vulnerability Database".