πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-40753 β€Ό

Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
❌ 3 Top Tools for Defending Against Phishing Attacks ❌

Phishing emails are now skating past traditional defenses. Justin Jett, director of audit and compliance at Plixer, discusses what to do about it.

πŸ“– Read

via "Threat Post".
🦿 Windows 11 SE: Why it's both more and less locked down than Windows 10 S 🦿

Managing computers for education is complicated, but Microsoft thinks it has a solution.

πŸ“– Read

via "Tech Republic".
🦿 How to install the OpenSSH server on Windows with PowerShell 🦿

If you've ever had a need to SSH into a Windows machine, Jack Wallen shows you how to make that possible with the help of PowerShell.

πŸ“– Read

via "Tech Republic".
πŸ•΄ California Pizza Kitchen Suffers Data Breach πŸ•΄

Personal data, including Social Security numbers, of more than 100K employees exposed.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-43017 β€Ό

Adobe Creative Cloud version 5.5 (and earlier) are affected by an Application denial of service vulnerability in the Creative Cloud Desktop installer. An authenticated attacker could leverage this vulnerability to achieve denial of service in the context of the user. User interaction is required before product installation to abuse this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39920 β€Ό

NULL pointer exception in the IPPUSB dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23193 β€Ό

Improper privilege validation vulnerability in COM Interface of Gallagher Command Centre Server allows authenticated unprivileged operators to retrieve sensitive information from the Command Centre Server. This issue affects: Gallagher Command Centre 8.50 versions prior to 8.50.2048 (MR3) ; 8.40 versions prior to 8.40.2063 (MR4); 8.30 versions prior to 8.30.1454 (MR4) ; 8.20 versions prior to 8.20.1291 (MR6); version 8.10 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39928 β€Ό

NULL pointer exception in the IEEE 802.11 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23197 β€Ό

Unquoted service path vulnerability in the Gallagher Controller Service allows an unprivileged user to execute arbitrary code as the account that runs the Controller Service. This issue affects: Gallagher Command Centre 8.50 versions prior to 8.50.2048 (MR3) ;

πŸ“– Read

via "National Vulnerability Database".
❌ Ransomware Phishing Emails Sneak Through SEGs ❌

The MICROP ransomware spreads via Google Drive and locally stored passwords.

πŸ“– Read

via "Threat Post".
⚠ Github cookie leakage – thousands of Firefox cookie files uploaded by mistake ⚠

Be aware before you share! That's a good rule for developers and techies, just as much as it is for social media addicts.

πŸ“– Read

via "Naked Security".
πŸ•΄ Two Iranian Nationals Charged for Cyber-Enabled Disinformation and Threat Campaign Designed to Influence the 2020 US Presidential Election πŸ•΄

An indictment was unsealed charging two Iranian nationals for their involvement in a cyber-enabled campaign to intimidate and influence American voters, and otherwise undermine voter confidence and sow discord, in connection with the 2020 US presidential election.

πŸ“– Read

via "Dark Reading".
πŸ•΄ North Korean Hacking Group Targets Diplomats, Forgoes Malware πŸ•΄

The TA406 group uses credential harvesting to target diplomats and policy experts in the United States, Russia, China, and South Korea, rarely resorting to malware.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-37322 β€Ό

GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Exchange Server Flaws Now Exploited for BEC Attacks πŸ•΄

Attackers also are deploying ProxyShell and abusing the vulnerabilities in stealthier manner, researchers say.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-40129 β€Ό

A vulnerability in the configuration dashboard of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to submit a SQL query through the CSPC configuration dashboard. This vulnerability is due to insufficient input validation of uploaded files. An attacker could exploit this vulnerability by uploading a file containing a SQL query to the configuration dashboard. A successful exploit could allow the attacker to read restricted information from the CSPC SQL database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40130 β€Ό

A vulnerability in the web application of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to specify non-log files as sources for syslog reporting. This vulnerability is due to improper restriction of the syslog configuration. An attacker could exploit this vulnerability by configuring non-log files as sources for syslog reporting through the web application. A successful exploit could allow the attacker to read non-log files on the CSPC.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41278 β€Ό

Functions SDK for EdgeX is meant to provide all the plumbing necessary for developers to get started in processing/transforming/exporting data out of the EdgeX IoT platform. In affected versions broken encryption in app-functions-sdk Ò€œAESҀ� transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors. The app-functions-sdk exports an Ò€œaesҀ� transform that user scripts can optionally call to encrypt data in the processing pipeline. No decrypt function is provided. Encryption is not enabled by default, but if used, the level of protection may be less than the user may expects due to a broken implementation. Version v2.1.0 (EdgeX Foundry Jakarta release and later) of app-functions-sdk-go/v2 deprecates the Ò€œaesҀ� transform and provides an improved Ò€œaes256Ҁ� transform in its place. The broken implementation will remain in a deprecated state until it is removed in the next EdgeX major release to avoid breakage of existing software that depends on the broken implementation. As the broken transform is a library function that is not invoked by default, users who do not use the AES transform in their processing pipelines are unaffected. Those that are affected are urged to upgrade to the Jakarta EdgeX release and modify processing pipelines to use the new "aes256" transform.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40131 β€Ό

A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by adding malicious code to the configuration by using the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Search CT Logs for Misconfigured SSL Certificates πŸ•΄

Security defenders can run these queries against Certificate Transparency logs to identify misconfigured SSL certificates before they can be used by adversaries to map out attacks.

πŸ“– Read

via "Dark Reading".