πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-43555 β€Ό

mySCADA myDESIGNER Versions 8.20.0 and prior fails to properly validate contents of an imported project file, which may make the product vulnerable to a path traversal payload. This vulnerability may allow an attacker to plant files on the file system in arbitrary locations or overwrite existing files, resulting in remote code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 3 Takeaways from the Gartner Risk Management Summit πŸ•΄

Security leaders can be treated as partners supporting the business and share accountability by establishing relationships with business stakeholders.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ The β€˜Zelle Fraud’ Scam: How it Works, How to Fight Back β™ŸοΈ

One of the more common ways cybercriminals cash out access to bank accounts involves draining the victim's funds via Zelle, a "peer-to-peer" (P2P) payment service used by many financial institutions that allows customers to quickly send cash to friends and family. Naturally, a great deal of phishing schemes that precede these bank account takeovers begin with a spoofed text message from the target's bank warning about a suspicious Zelle transfer. What follows is a deep dive into how this increasingly clever Zelle fraud scam typically works, and what victims can do about it.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ US Banks Will Be Required to Report Cyberattacks Within 36 Hours πŸ•΄

There is currently no specific time frame during which banks must report to federal regulators that a security incident had occurred. A new notification rules changes that to 36 hours.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-39198 β€Ό

OroCRM is an open source Client Relationship Management (CRM) application. Affected versions we found to suffer from a vulnerability which could an attacker is able to disqualify any Lead with a Cross-Site Request Forgery (CSRF) attack. There are no workarounds that address this vulnerability and all users are advised to update their package.

πŸ“– Read

via "National Vulnerability Database".
🦿 8 advanced threats Kaspersky predicts for 2022 🦿

Advanced threats constantly evolve. This year saw multiple examples of advanced persistent threats under the spotlight, allowing us to predict what threats might lead the future.

πŸ“– Read

via "Tech Republic".
🦿 Cisco partners with JupiterOne to enhance its SecureX product portfolio 🦿

The new product, Cisco Secure Cloud Insights, offers cloud inventory tracking and relationship mapping to navigate public clouds as well as access rights management and security compliance reporting.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-36321 β€Ό

Dell Networking X-Series firmware versions prior to 3.0.1.8 contain an improper input validation vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by sending specially crafted data to trigger a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36310 β€Ό

Dell Networking OS10, versions 10.4.3.x, 10.5.0.x, 10.5.1.x & 10.5.2.x, contain an uncontrolled resource consumption flaw in its API service. A high-privileged API user may potentially exploit this vulnerability, leading to a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36307 β€Ό

Networking OS10, versions prior to October 2021 with RESTCONF API enabled, contains a privilege escalation vulnerability. A malicious low privileged user with specific access to the API could potentially exploit this vulnerability to gain admin privileges on the affected system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36308 β€Ό

Networking OS10, versions prior to October 2021 with Smart Fabric Services enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36322 β€Ό

Dell Networking X-Series firmware versions prior to 3.0.1.8 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary host header values to poison the web-cache or trigger redirections.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36320 β€Ό

Dell Networking X-Series firmware versions prior to 3.0.1.8 contain an authentication bypass vulnerability. A remote unauthenticated attacker may potentially hijack a session and access the webserver by forging the session ID.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36319 β€Ό

Dell Networking OS10 versions 10.4.3.x, 10.5.0.x and 10.5.1.x contain an information exposure vulnerability. A low privileged authenticated malicious user can gain access to SNMP authentication failure messages.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36340 β€Ό

Dell EMC SCG 5.00.00.10 and earlier, contain a sensitive information disclosure vulnerability. A local malicious user may exploit this vulnerability to read sensitive information and use it.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38681 β€Ό

A reflected cross-site scripting (XSS) vulnerability has been reported to affect QNAP NAS running Ragic Cloud DB. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already disabled and removed Ragic Cloud DB from the QNAP App Center, pending a security patch from Ragic.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36306 β€Ό

Networking OS10, versions prior to October 2021 with RESTCONF API enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34358 β€Ό

We have already fixed this vulnerability in the following versions of QmailAgent: QmailAgent 3.0.2 ( 2021/08/25 ) and later

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Protecting every edge to make hackers’ jobs harder, not yours πŸ“’

How to support and secure hybrid architectures

πŸ“– Read

via "ITPro".
πŸ“’ CISA unveils government cyber security response playbooks πŸ“’

Playbook follows President Biden's April executive order

πŸ“– Read

via "ITPro".
πŸ“’ UK and US pledge to punish cyber criminals at annual meeting πŸ“’

Intelligence and defence officials met at the annual forum to discuss approaches to cyber security for the years ahead

πŸ“– Read

via "ITPro".