❌ Back-to-Back PlayStation 5 Hacks Hit on the Same Day ❌
📖 Read
via "Threat Post".
Cyberattackers stole PS5 root keys and exploited the kernel, revealing rampant insecurity in gaming devices.📖 Read
via "Threat Post".
Threat Post
Back-to-Back PlayStation 5 Hacks Hit on the Same Day
Cyberattackers stole PS5 root keys and exploited the kernel, revealing rampant insecurity in gaming devices.
❌ Invest in These 3 Key Security Technologies to Fight Ransomware ❌
📖 Read
via "Threat Post".
Ransomware volumes are up 1000%. Aamir Lakhani, cybersecurity researcher and practitioner at FortiGuard Labs , discusses secure email, network segmentation and sandboxing for defense.📖 Read
via "Threat Post".
Threat Post
Invest in These 3 Key Security Technologies to Fight Ransomware
Aamir Lakhani is a cybersecurity researcher and practitioner at FortiGuard Labs .
🦿 Learn how to become an ethical hacker for only $21 during this pre-Black Friday sale 🦿
📖 Read
via "Tech Republic".
You don't need to break the bank to get the training required for an exciting new career, especially when you've got the right coupon code.📖 Read
via "Tech Republic".
TechRepublic
Learn how to become an ethical hacker for only $21 during this pre-Black Friday sale
You don't need to break the bank to get the training required for an exciting new career, especially when you've got the right coupon code.
‼ CVE-2002-20001 ‼
📖 Read
via "National Vulnerability Database".
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.📖 Read
via "National Vulnerability Database".
🕴 How Do I Know It's Time to Consider a SASE Migration? 🕴
📖 Read
via "Dark Reading".
The rapid shift to a hybrid workplace and accelerated adoption of new technologies means it's time to rethink networking security approaches.📖 Read
via "Dark Reading".
Dark Reading
How Do I Know It's Time to Consider a SASE Migration?
The rapid shift to a hybrid workplace and accelerated adoption of new technologies means it's time to rethink networking security approaches.
‼ CVE-2021-3908 ‼
📖 Read
via "National Vulnerability Database".
OctoRPKI does not limit the depth of a certificate chain, allowing for a CA to create children in an ad-hoc fashion, thereby making tree traversal never end.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3909 ‼
📖 Read
via "National Vulnerability Database".
OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes to keep the connection alive.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3910 ‼
📖 Read
via "National Vulnerability Database".
OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded NUL (\0) character).📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3907 ‼
📖 Read
via "National Vulnerability Database".
OctoRPKI does not escape a URI with a filename containing "..", this allows a repository to create a file, (ex. rsync://example.org/repo/../../etc/cron.daily/evil.roa), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3912 ‼
📖 Read
via "National Vulnerability Database".
OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash).📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3911 ‼
📖 Read
via "National Vulnerability Database".
If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash.📖 Read
via "National Vulnerability Database".
🕴 Google Open Sources ClusterFuzzLite 🕴
📖 Read
via "Dark Reading".
ClusterFuzzLite is a stripped-down version of continuous fuzzing tool ClusterFuzz that integrates CI tools.📖 Read
via "Dark Reading".
Dark Reading
Google Open Sources ClusterFuzzLite
ClusterFuzzLite is a stripped-down version of continuous fuzzing tool ClusterFuzz that integrates CI tools.
🕴 'Lyceum' Threat Group Broadens Focus to ISPs 🕴
📖 Read
via "Dark Reading".
New report suggests attacker is targeting trusted supply chain companies in order to compromise large numbers of downstream customers.📖 Read
via "Dark Reading".
Dark Reading
'Lyceum' Threat Group Broadens Focus to ISPs
New report suggests attacker is targeting trusted supply chain companies in order to compromise large numbers of downstream customers.
‼ CVE-2021-34422 ‼
📖 Read
via "National Vulnerability Database".
The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34421 ‼
📖 Read
via "National Vulnerability Database".
The Keybase Client for Android before version 5.8.0 and the Keybase Client for iOS before version 5.8.0 fails to properly remove exploded messages initiated by a user if the receiving user places the chat session in the background while the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from the customer's device.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34419 ‼
📖 Read
via "National Vulnerability Database".
In the Zoom Client for Meetings for Ubuntu Linux before version 5.1.0, there is an HTML injection flaw when sending a remote control request to a user in the process of in-meeting screen sharing. This could allow meeting participants to be targeted for social engineering attacks.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34420 ‼
📖 Read
via "National Vulnerability Database".
The Zoom Client for Meetings for Windows installer before version 5.5.4 does not properly verify the signature of files with .msi, .ps1, and .bat extensions. This could lead to a malicious actor installing malicious software on a customer's computer.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34418 ‼
📖 Read
via "National Vulnerability Database".
The login routine of the web console in the Zoom On-Premise Meeting Connector before version 4.6.239.20200613, Zoom On-Premise Meeting Connector MMR before version 4.6.239.20200613, Zoom On-Premise Recording Connector before version 3.8.42.20200905, Zoom On-Premise Virtual Room Connector before version 4.4.6344.20200612, and Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5492.20200616 fails to validate that a NULL byte was sent while authenticating. This could lead to a crash of the login service.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34417 ‼
📖 Read
via "National Vulnerability Database".
The network proxy page on the web portal for the Zoom On-Premise Meeting Connector Controller before version 4.6.365.20210703, Zoom On-Premise Meeting Connector MMR before version 4.6.365.20210703, Zoom On-Premise Recording Connector before version 3.8.45.20210703, Zoom On-Premise Virtual Room Connector before version 4.4.6868.20210703, and Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5496.20210703 fails to validate input sent in requests to set the network proxy password. This could lead to remote command injection by a web portal administrator.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-1903 ‼
📖 Read
via "National Vulnerability Database".
Possible denial of service scenario can occur due to lack of length check on Channel Switch Announcement IE in beacon or probe response frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking📖 Read
via "National Vulnerability Database".
‼ CVE-2021-30266 ‼
📖 Read
via "National Vulnerability Database".
Possible use after free due to improper memory validation when initializing new interface via Interface add command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking📖 Read
via "National Vulnerability Database".