βΌ CVE-2021-43350 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated Apache Traffic Control Traffic Ops user can send a request with a specially-crafted username to the POST /login endpoint of any API version to inject unsanitized content into the LDAP filter.π Read
via "National Vulnerability Database".
ποΈ Zero tolerance: How infosecβs online βcancel cultureβ is stunting industry growth ποΈ
π Read
via "The Daily Swig".
Fear of Twitter fallout is stopping vital information from being shared Social media backlash and online squabbling is stopping the information security industry from learning from its mistakes, Blackπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Zero tolerance: How infosecβs online βcancel cultureβ is stunting industry growth
Fear of Twitter fallout is stopping vital information from being shared
π¦Ώ This pre-Black Friday sale lets you save an extra 15% off cybersecurity certification training courses π¦Ώ
π Read
via "Tech Republic".
Receive over 100 hours of expert instruction on globally recognized cybersecurity skills that will help you become an in-demand IT professional.π Read
via "Tech Republic".
TechRepublic
This pre-Black Friday sale lets you save an extra 15% off cybersecurity certification training courses
Receive over 100 hours of expert instruction on globally recognized cybersecurity skills that will help you become an in-demand IT professional.
π¦Ώ How to easily transfer files between computers with croc π¦Ώ
π Read
via "Tech Republic".
If you're looking for an easy command-line tool to transfer files between systems on the same LAN, Jack Wallen believes croc is the tool for the job.π Read
via "Tech Republic".
TechRepublic
How to easily transfer files between computers with croc
If you're looking for an easy command-line tool to transfer files between systems on the same LAN, Jack Wallen believes croc is the tool for the job.
ποΈ GoCD bug chain provides second springboard to supply chain attacks ποΈ
π Read
via "The Daily Swig".
Follow-up to recent GoCD disclosure provides additional path to infiltrating build environmentsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
GoCD bug chain provides second springboard for supply chain attacks
Follow-up to recent GoCD disclosure provides additional path to infiltrating build environments
β S3 Ep58: Faces on Facebook, scams that pose as complaints, and a Kaseya bust [Podcast] β
π Read
via "Naked Security".
Latest epsiode - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep58: Faces on Facebook, scams that pose as complaints, and a Kaseya bust [Podcast]
Latest epsiode β listen now!
π΄ Third-Party Software Risks Grow, but So Do Solutions π΄
π Read
via "Dark Reading".
Enterprises are more dependent than ever on open source software and need to manage the risk posed by vulnerabilities in components and third-party vendors.π Read
via "Dark Reading".
Dark Reading
Third-Party Software Risks Grow, but So Do Solutions
Enterprises are more dependent than ever on open source software and need to manage the risk posed by vulnerabilities in components and third-party vendors.
π΄ Insider IP Theft Is Surging β and Most Can't Stop It π΄
π Read
via "Dark Reading".
The Great Resignation is upon us, and insider IP theft is surging as a result. But it is a solvable problem.π Read
via "Dark Reading".
Dark Reading
Insider IP Theft Is Surging β and Most Can't Stop It
The Great Resignation is upon us, and insider IP theft is surging as a result. But it is a solvable problem.
β Congress Mulls Ban on Big Ransom Payouts β
π Read
via "Threat Post".
A bill introduced this week would regulate ransomware response by the country's critical financial sector.π Read
via "Threat Post".
Threat Post
Congress Mulls Ban on Big Ransom Payouts Unless Victims Get Official Say-So
A bill introduced this week would regulate ransomware response by the country's critical financial sector.
π¦Ώ Research: Supply chain and COVID-19 challenges forces companies to shift their security strategies π¦Ώ
π Read
via "Tech Republic".
64% of survey respondents reported that their companies have concerns about security risks for supply chains.π Read
via "Tech Republic".
TechRepublic
Research: Supply chain and COVID-19 challenges forces companies to shift their security strategies
64% of survey respondents reported that their companies have concerns about security risks for supply chains.
π΄ What Happens If Time Gets Hacked π΄
π Read
via "Dark Reading".
Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure.π Read
via "Dark Reading".
Dark Reading
What Happens If Time Gets Hacked
Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure.
π΄ Cloud Attack Analysis Unearths Lessons for Security Pros π΄
π Read
via "Dark Reading".
Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.π Read
via "Dark Reading".
Dark Reading
Cloud Attack Analysis Unearths Lessons for Security Pros
Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.
β Cyber-Mercenary Group Void Balaur Attacks High-Profile Targets for Cash β
π Read
via "Threat Post".
A Russian-language threat group is available for hire, to steal data on journalists, political leaders, activists and from organizations in every sector.π Read
via "Threat Post".
Threat Post
Cyber-Mercenary Group Void Balaur Attacks High-Profile Targets for Cash
A Russian-language threat group is available for hire, to steal data on journalists, political leaders, activists and from organizations in every sector.
β Back-to-Back PlayStation 5 Hacks Hit on the Same Day β
π Read
via "Threat Post".
Cyberattackers stole PS5 root keys and exploited the kernel, revealing rampant insecurity in gaming devices.π Read
via "Threat Post".
Threat Post
Back-to-Back PlayStation 5 Hacks Hit on the Same Day
Cyberattackers stole PS5 root keys and exploited the kernel, revealing rampant insecurity in gaming devices.
β Invest in These 3 Key Security Technologies to Fight Ransomware β
π Read
via "Threat Post".
Ransomware volumes are up 1000%. Aamir Lakhani, cybersecurity researcher and practitioner at FortiGuard Labs , discusses secure email, network segmentation and sandboxing for defense.π Read
via "Threat Post".
Threat Post
Invest in These 3 Key Security Technologies to Fight Ransomware
Aamir Lakhani is a cybersecurity researcher and practitioner at FortiGuard Labs .
π¦Ώ Learn how to become an ethical hacker for only $21 during this pre-Black Friday sale π¦Ώ
π Read
via "Tech Republic".
You don't need to break the bank to get the training required for an exciting new career, especially when you've got the right coupon code.π Read
via "Tech Republic".
TechRepublic
Learn how to become an ethical hacker for only $21 during this pre-Black Friday sale
You don't need to break the bank to get the training required for an exciting new career, especially when you've got the right coupon code.
βΌ CVE-2002-20001 βΌ
π Read
via "National Vulnerability Database".
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.π Read
via "National Vulnerability Database".
π΄ How Do I Know It's Time to Consider a SASE Migration? π΄
π Read
via "Dark Reading".
The rapid shift to a hybrid workplace and accelerated adoption of new technologies means it's time to rethink networking security approaches.π Read
via "Dark Reading".
Dark Reading
How Do I Know It's Time to Consider a SASE Migration?
The rapid shift to a hybrid workplace and accelerated adoption of new technologies means it's time to rethink networking security approaches.
βΌ CVE-2021-3908 βΌ
π Read
via "National Vulnerability Database".
OctoRPKI does not limit the depth of a certificate chain, allowing for a CA to create children in an ad-hoc fashion, thereby making tree traversal never end.π Read
via "National Vulnerability Database".
βΌ CVE-2021-3909 βΌ
π Read
via "National Vulnerability Database".
OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes to keep the connection alive.π Read
via "National Vulnerability Database".
βΌ CVE-2021-3910 βΌ
π Read
via "National Vulnerability Database".
OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded NUL (\0) character).π Read
via "National Vulnerability Database".