πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-42327 β€Ό

dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.

πŸ“– Read

via "National Vulnerability Database".
πŸ” US Treasury Outlines Compliance Best Practices for Cryptocurrency Companies πŸ”

The newly released guide is designed to emphasize sanctions compliance requirements amid the US government’s efforts to combat ransomware.

πŸ“– Read

via "".
πŸ•΄ Why Should My Organization Consider XDR? πŸ•΄

XDR is a newish industry term addressing a very old problem: security products that don't work together to detect threats.

πŸ“– Read

via "Dark Reading".
❌ TA551 Shifts Tactics to Install Sliver Red-Teaming Tool ❌

A new email campaign from the threat group uses the attack-simulation framework in a likely leadup to ransomware deployment.

πŸ“– Read

via "Threat Post".
❌ U.S. Ban on Sales of Cyberattack Tools Is Anemic, Experts Warn ❌

Meanwhile, Zerodium's quest to buy VPN exploits is problematic, researchers said.

πŸ“– Read

via "Threat Post".
πŸ•΄ Plurilock to Acquire Assets of CloudCodes Software πŸ•΄

Transaction marks Plurilock’s second acquisition in 2021.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Invicti Security Announces $625 Million Growth Investment Led by Summit Partners πŸ•΄

Web application security provider plans to leverage new investment to continue product expansion and support global growth.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Nearly Three-Quarters of Organizations Victimized by DNS Attacks in Past 12 Months πŸ•΄

Response and recovery have significant impact on 58% of targeted businesses.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cohesity Announces Disaster Recovery as a Service, Providing Automated Disaster Recovery πŸ•΄

New Offering Can Help Businesses Quickly Recover from Ransomware Attacks, Speed Data Recovery, and Advance Business Continuity

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-41146 β€Ό

qutebrowser is an open source keyboard-focused browser with a minimal GUI. Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers a `qutebrowserurl:` URL handler. With certain applications, opening a specially crafted `qutebrowserurl:...` URL can lead to execution of qutebrowser commands, which in turn allows arbitrary code execution via commands such as `:spawn` or `:debug-pyeval`. Only Windows installs where qutebrowser is registered as URL handler are affected. The issue has been fixed in qutebrowser v2.4.0. The fix also adds additional hardening for potential similar issues on Linux (by adding the new --untrusted-args flag to the .desktop file), though no such vulnerabilities are known.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42716 β€Ό

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42715 β€Ό

An issue was discovered in stb stb_image.h 1.33 through 2.27. The HDR loader parsed truncated end-of-file RLE scanlines as an infinite sequence of zero-length runs. An attacker could potentially have caused denial of service in applications using stb_image by submitting crafted HDR files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35225 β€Ό

Each authenticated Orion Platform user in a MSP (Managed Service Provider) environment can view and browse all NetPath Services from all that MSP's customers. This can lead to any user having a limited insight into other customer's infrastructure and potential data cross-contamination.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41159 β€Ό

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41160 β€Ό

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35228 β€Ό

This vulnerability occurred due to missing input sanitization for one of the output fields that is extracted from headers on specific section of page causing a reflective cross site scripting attack. An attacker would need to perform a Man in the Middle attack in order to change header for a remote victim.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35227 β€Ό

The HTTP interface was enabled for RabbitMQ Plugin in ARM 2020.2.6 and the ability to configure HTTPS was not available.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Akamai Technologies Completes Acquisition of Guardicore to Extend Its Zero Trust Solutions to Help Stop Ransomware πŸ•΄

Guardicore's micro-segmentation products will be added to Akamai's portfolio of Zero Trust solutions.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Malware Abuses Core Features of Discord πŸ•΄

Researchers warn that Discord's bot framework can be easily weaponized.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cybrary Launches New Partnership with Check Point Software to Make Cybersecurity Training Accessible to All πŸ•΄

Online cybersecurity professional development platform bolsters the Check Point Education Initiative.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Google Buckles Down on Android Enterprise Security πŸ•΄

The launch of Android 12 brings several new default security features, along with new security efforts for Android Enterprise.

πŸ“– Read

via "Dark Reading".