πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Oak9’s IaC security platform now available on AWS πŸ“’

The solution speeds up app deployment while providing comprehensive security

πŸ“– Read

via "ITPro".
πŸ“’ The best remote access solutions πŸ“’

We round up the top remote access software for mobile workers, including those with collaboration, screen-sharing and support tools

πŸ“– Read

via "ITPro".
πŸ“’ Almost 70% of CISOs expect a ransomware attack πŸ“’

Many companies are willing to make ransomware payments in the face of the growing threat

πŸ“– Read

via "ITPro".
β€Ό CVE-2021-40371 β€Ό

Gridpro Request Management for Windows Azure Pack before 2.0.7912 allows Directory Traversal for remote code execution, as demonstrated by ..\\ in a scriptName JSON value to ServiceManagerTenant/GetVisibilityMap.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21703 β€Ό

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

πŸ“– Read

via "National Vulnerability Database".
⚠ Cybersecurity Awareness Month: Listen up – CYBERSECURITY FIRST! ⚠

Fraser Howard of SophosLabs is truly a world expert in fighting malware. Read now, and learn from the best!

πŸ“– Read

via "Naked Security".
⚠ REvil ransomware gang allegedly forced offline by law enforcement counterattacks ⚠

One down. Lots more to go. Here's what to do...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-40527 β€Ό

Exposure of senstive information to an unauthorised actor in the "com.onepeloton.erlich" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40526 β€Ό

Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead to an Apple MFI device not being able to authenticate with the Peleton Bike

πŸ“– Read

via "National Vulnerability Database".
⚠ Listen up 2 – CYBERSECURITY FIRST! How to protect yourself from supply chain attacks ⚠

Everyone remembers this year's big-news supply chain attacks on Kaseya and SolarWinds. Sophos expert Chester Wisniewski explains how to control the risk.

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Polygon pays out record $2 million bug bounty reward for critical vulnerability πŸ—“οΈ

Ethical hacker bags top prize for double spend flaw in smart contract

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ Discourse fixes critical validation-related vulnerability in forum software πŸ—“οΈ

We need to talk about lack of validation

πŸ“– Read

via "The Daily Swig".
❌ CISA Urges Sites to Patch Critical RCE in Discourse ❌

The patch, urgently rushed out on Friday, is an emergency fix for the widely deployed platform, whose No. 1 most trafficked site is Amazon’s Seller Central.

πŸ“– Read

via "Threat Post".
⚠ Listen up 3 – CYBERSECURITY FIRST! Cyberinsurance, help or hindrance? ⚠

Dr Jason Nurse, Associate Professor in Cybersecurity at the University of Kent, takes on the controversial topic of cyberinsurance.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-24774 β€Ό

The Check & Log Email WordPress plugin before 1.0.3 does not validate and escape the "order" and "orderby" GET parameters before using them in a SQL statement when viewing logs, leading to SQL injections issues

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24515 β€Ό

The Video Gallery ΓƒΒ’Γ’β€šΒ¬Γ’β‚¬Ε“ Vimeo and YouTube Gallery WordPress plugin through 1.1.4 does not escape the Title and Description of the videos in a gallery before outputting them in attributes, leading to Stored Cross-Site Scripting issues

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24608 β€Ό

The Formidable Form Builder ΓƒΒ’Γ’β€šΒ¬Γ’β‚¬Ε“ Contact Form, Survey & Quiz Forms Plugin for WordPress plugin before 5.0.07 does not sanitise and escape its Form's Labels, allowing high privileged users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24489 β€Ό

The Request a Quote WordPress plugin before 2.3.5 does not sanitise, validate or escape some of its settings in the admin dashboard, leading to authenticated Stored Cross-Site Scripting issues even when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24884 β€Ό

The Formidable Form Builder WordPress plugin before 4.09.05 allows to inject certain HTML Tags like <audio>,<video>,<img>,<a> and<button>.This could allow an unauthenticated, remote attacker to exploit a HTML-injection byinjecting a malicous link. The HTML-injection may trick authenticated users to follow the link. If the Link gets clicked, Javascript code can be executed. The vulnerability is due to insufficient sanitization of the "data-frmverify" tag for links in the web-based entry inspection page of affected systems. A successful exploitation incomibantion with CSRF could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These actions include stealing the users account by changing their password or allowing attackers to submit their own code through an authenticated user resulting in Remote Code Execution. If an authenticated user who is able to edit Wordpress PHP Code in any kind, clicks the malicious link, PHP code can be edited.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0939 β€Ό

In set_default_passthru_cfg of passthru.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186026549References: N/A

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0410 β€Ό

In flv extractor, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561360; Issue ID: ALPS05561360.

πŸ“– Read

via "National Vulnerability Database".