πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Finland Faces Blizzard of FluBot-Spreading Text Messages ❌

Millions of texts leading to the Flubot spyware/banking trojan are targeting everyone who uses Androids in the country, in an "exceptional" attack.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-38967 β€Ό

IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local privileged user to inject and execute malicious code. IBM X-Force ID: 212441.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39000 β€Ό

IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local attacker to obtain sensitive information by inclusion of sensitive data within diagnostics. IBM X-Force ID: 213215.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38958 β€Ό

IBM MQ Appliance 9.2 CD and 9.2 LTS is affected by a denial of service attack caused by a concurrency issue. IBM X-Force ID: 212042

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38999 β€Ό

IBM MQ Appliance could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace.

πŸ“– Read

via "National Vulnerability Database".
❌ Lloyd’s Carves Out Cyber-Insurance Exclusions for State-Sponsored Attacks ❌

The insurer won’t pay for 'acts of cyber-war' or nation-state retaliation attacks.   

πŸ“– Read

via "Threat Post".
πŸ•΄ Attacker Sentenced in Multimillion-Dollar SIM Hijacking Scheme πŸ•΄

A sixth member of international hacking group The Community was sentenced to 10 months in prison and ordered to pay $121,549.37 in restitution.

πŸ“– Read

via "Dark Reading".
❌ How Decryption of Network Traffic Can Improve Security ❌

Most industry analyst firms conclude that between 80-90 percent of network traffic is encrypted today. Jeff Costlow, CISO at ExtraHop, explains why this might not be a good thing.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-7879 β€Ό

This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42099 β€Ό

Zoho ManageEngine M365 Manager Plus before 4421 is vulnerable to file-upload remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43296 β€Ό

Zoho ManageEngine SupportCenter Plus before 11016 is vulnerable to an SSRF attack in ActionExecutor.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31787 β€Ό

The Bluetooth Classic implementation on Actions ATS2815 chipsets does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and shutdown of a device by flooding the target device with LMP_features_res packets.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43294 β€Ό

Zoho ManageEngine SupportCenter Plus before 11016 is vulnerable to Reflected XSS in the Products module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42564 β€Ό

An open redirect through HTML injection in confidential messages in Cryptshare before 5.1.0 allows remote attackers (with permission to provide confidential messages via Cryptshare) to redirect targeted victims to any URL via the '<meta http-equiv="refresh"' substring in the editor parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44230 β€Ό

PortSwigger Burp Suite Enterprise Edition before 2021.11 on Windows has weak file permissions for the embedded H2 database, which might lead to privilege escalation. This issue can be exploited by an adversary who has already compromised a valid Windows account on the server via separate means. In this scenario, the compromised account may have inherited read access to sensitive configuration, database, and log files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40101 β€Ό

An issue was discovered in Concrete CMS before 8.5.7. The Dashboard allows a user's password to be changed without a prompt for the current password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43283 β€Ό

An issue was discovered on Victure WR1200 devices through 1.0.3. A command injection vulnerability was found within the web interface of the device, allowing an attacker with valid credentials to inject arbitrary shell commands to be executed by the device with root privileges. This occurs in the ping and traceroute features. An attacker would thus be able to use this vulnerability to open a reverse shell on the device with root privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4026 β€Ό

bookstack is vulnerable to Improper Access Control

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26612 β€Ό

An improper input validation leading to arbitrary file creation was discovered in copy method of Nexacro platform. Remote attackers use copy method to execute arbitrary command after the file creation included malicious code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7880 β€Ό

The vulnerabilty was discovered in ActiveX module related to NeoRS remote support program. This issue allows an remote attacker to download and execute remote file. It is because of improper parameter validation of StartNeoRS function in ActiveX.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43320 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-41244. Reason: This candidate is a reservation duplicate of CVE-2021-41244. Notes: All CVE users should reference CVE-2021-41244 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".