π΄ NSA-CISA Series on Securing 5G Cloud Infrastructures π΄
π Read
via "Dark Reading".
CISA encourages 5G providers, integrators, and network operators to review the guidance and consider the recommendations.π Read
via "Dark Reading".
π΄ Tech Companies Create Security Baseline for Enterprise Software π΄
π Read
via "Dark Reading".
The Minimum Viable Secure Product is written as a checklist of minimum-security requirements for business-to-business software.π Read
via "Dark Reading".
Dark Reading
Tech Companies Create Security Baseline for Enterprise Software
The Minimum Viable Secure Product is written as a checklist of minimum-security requirements for business-to-business software.
π΄ Ordr Unveils Cybersecurity Innovations and Ransom-Aware Rapid Assessment Service to Expand Its Leadership In Connected Device Security π΄
π Read
via "Dark Reading".
Enhanced ransomware detection, visualization of ransomware communications, and risk customization helps organizations respond to cyberattacks in minutes.π Read
via "Dark Reading".
Dark Reading
Ordr Unveils Cybersecurity Innovations and Ransom-Aware Rapid Assessment Service to Expand Its Leadership In Connected Device Security
Enhanced ransomware detection, visualization of ransomware communications, and risk customization helps organizations respond to cyberattacks in minutes.
π΄ ICS Security Firm Dragos Reaches $1.7B Valuation in Latest Funding Round π΄
π Read
via "Dark Reading".
The $200M Series D represents the company's largest funding round to date.π Read
via "Dark Reading".
Dark Reading
ICS Security Firm Dragos Reaches $1.7B Valuation in Latest Funding Round
The $200M Series D represents the company's largest funding round to date.
π΄ SEO Poisoning Used to Distribute Ransomware π΄
π Read
via "Dark Reading".
This tactic β used to distribute REvil ransomware and the SolarMarker backdoor β is part of a broader increase in such attacks in recent months, researchers say.π Read
via "Dark Reading".
Dark Reading
SEO Poisoning Used to Distribute Ransomware
This tactic β used to distribute REvil ransomware and the SolarMarker backdoor β is part of a broader increase in such attacks in recent months, researchers say.
β All Sectors Are Now Prey as Cyber Threats Expand Targeting β
π Read
via "Threat Post".
Aamir Lakhani, security researcher at Fortinet, says no sector is off limits these days: It's time for everyone to strengthen the kill chain.π Read
via "Threat Post".
Threat Post
All Sectors Are Now Prey as Cyber Threats Expand Targeting
Aamir Lakhani, security researcher at Fortinet, says no sector is off limits these days: It's time for everyone to strengthen the kill chain.
βΌ CVE-2021-36547 βΌ
π Read
via "National Vulnerability Database".
A remote code execution (RCE) vulnerability in the component /codebase/dir.php?type=filenew of Mara v7.5 allows attackers to execute arbitrary commands via a crafted PHP file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36551 βΌ
π Read
via "National Vulnerability Database".
TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-calendar.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Add Event module.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36550 βΌ
π Read
via "National Vulnerability Database".
TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-browse_categories.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Create category module.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36548 βΌ
π Read
via "National Vulnerability Database".
A remote code execution (RCE) vulnerability in the component /admin/index.php?id=themes&action=edit_template&filename=blog of Monstra v3.0.4 allows attackers to execute arbitrary commands via a crafted PHP file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41194 βΌ
π Read
via "National Vulnerability Database".
FirstUseAuthenticator is a JupyterHub authenticator that helps new users set their password on their first login to JupyterHub. When JupyterHub is used with FirstUseAuthenticator, a vulnerability in versions prior to 1.0.0 allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. One may upgrade to version 1.0.0 or apply a patch manually to mitigate the vulnerability. For those who cannot upgrade, there is no complete workaround, but a partial mitigation exists. One can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until a patch or upgrade occurs.π Read
via "National Vulnerability Database".
β Microsoft Edge finally arrives on Linux β βOfficialβ build lands in repos β
π Read
via "Naked Security".
Microsoft Edge for Linux makes an Official landing.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ 6 Ways to Rewrite the Impossible Job Description π΄
π Read
via "Dark Reading".
It's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.π Read
via "Dark Reading".
Dark Reading
6 Ways to Rewrite the Impossible Job Description
It's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.
βΌ CVE-2020-23549 βΌ
π Read
via "National Vulnerability Database".
IrfanView 4.54 allows attackers to cause a denial of service or possibly other unspecified impacts via a crafted .cr2 file, related to a "Data from Faulting Address controls Branch Selection starting at FORMATS!GetPlugInInfo+0x00000000000047f6".π Read
via "National Vulnerability Database".
βΌ CVE-2020-23546 βΌ
π Read
via "National Vulnerability Database".
IrfanView 4.54 allows attackers to cause a denial of service or possibly other unspecified impacts via a crafted XBM file, related to a "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at FORMATS!ReadMosaic+0x0000000000000981.π Read
via "National Vulnerability Database".
ποΈ βInaction isnβt an optionβ β US lawmakers back mandatory standards for transport and logistics cybersecurity ποΈ
π Read
via "The Daily Swig".
House Committee on Homeland Security hearing pulls focus on securing βplanes, trains, and pipelinesβπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
βInaction isnβt an optionβ β US lawmakers back mandatory standards for transport and logistics cybersecurity
House Committee on Homeland Security hearing pulls focus on securing βplanes, trains, and pipelinesβ
βΌ CVE-2021-31624 βΌ
π Read
via "National Vulnerability Database".
Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the urls parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2020-22079 βΌ
π Read
via "National Vulnerability Database".
Stack-based buffer overflow in Tenda AC-10U AC1200 Router US_AC10UV1.0RTL_V15.03.06.48_multi_TDE01 allows remote attackers to execute arbitrary code via the timeZone parameter to goform/SetSysTimeCfg.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31862 βΌ
π Read
via "National Vulnerability Database".
SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31627 βΌ
π Read
via "National Vulnerability Database".
Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the index parameter.π Read
via "National Vulnerability Database".
ποΈ Google, Salesforce, others team up to launch MVSP security baseline project ποΈ
π Read
via "The Daily Swig".
The collaboration is focused on creating a vendor-neutral security standardπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Google, Salesforce, others team up to launch MVSP security baseline project
The collaboration is focused on creating a vendor-neutral security standard