βΌ CVE-2021-33269 βΌ
π Read
via "National Vulnerability Database".
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_8004776c in /formVirtualServ. This vulnerability is triggered via a crafted POST request.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33268 βΌ
π Read
via "National Vulnerability Database".
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function sub_8003183C in /fromLogin. This vulnerability is triggered via a crafted POST request.π Read
via "National Vulnerability Database".
π΄ Military Vets Share Lessons That Helped Them Build Infosec Startups π΄
π Read
via "Dark Reading".
Startup founders who previously served in the military share the lessons that have helped them build cybersecurity careers and companies.π Read
via "Dark Reading".
Dark Reading
Military Vets Share Lessons That Helped Them Build Infosec Startups
Startup founders say serving in the military taught them how to defend against cyberattacks and how to build teams. These lessons are serving them well as they run their own companies.
π΄ APT Groups Adopt New Phishing Method. Will Cybercriminals Follow? π΄
π Read
via "Dark Reading".
APT actors from Russia, China, and India have been observed using the RTF-template injection technique that researchers say is poised for wider adoption.π Read
via "Dark Reading".
Dark Reading
APT Groups Adopt New Phishing Method. Will Cybercriminals Follow?
APT actors from Russia, China, and India have been observed using the RTF-template injection technique that researchers say is poised for wider adoption.
βΌ CVE-2021-26777 βΌ
π Read
via "National Vulnerability Database".
Buffer overflow vulnerability in function SetFirewall in index.cgi in CIRCUTOR COMPACT DC-S BASIC smart metering concentrator Firwmare version CIR_CDC_v1.2.17, allows attackers to execute arbitrary code.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43791 βΌ
π Read
via "National Vulnerability Database".
Zulip is an open source group chat application that combines real-time chat with threaded conversations. In affected versions expiration dates on the confirmation objects associated with email invitations were not enforced properly in the new account registration flow. A confirmation link takes a user to the check_prereg_key_and_redirect endpoint, before getting redirected to POST to /accounts/register/. The problem was that validation was happening in the check_prereg_key_and_redirect part and not in /accounts/register/ - meaning that one could submit an expired confirmation key and be able to register. The issue is fixed in Zulip 4.8. There are no known workarounds and users are advised to upgrade as soon as possible.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27414 βΌ
π Read
via "National Vulnerability Database".
Mahavitaran android application 7.50 and prior transmit sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header, MITM or browser history.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44227 βΌ
π Read
via "National Vulnerability Database".
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.π Read
via "National Vulnerability Database".
ποΈ Data breach at Florida school district impacts 50,000 students and employees ποΈ
π Read
via "The Daily Swig".
Broward County School District backtracks after ransomware attackπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Data breach at Florida school district impacts 50,000 students and employees
Broward County School District backtracks after ransomware attack
ποΈ Insider threat: Tech firm was hacked and extorted by its own employee, says FBI ποΈ
π Read
via "The Daily Swig".
Senior developer also accused of posing as anonymous whistleblowerπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Insider threat: Tech firm was hacked and extorted by its own employee, says FBI
Senior developer also accused of posing as anonymous whistleblower
π΄ Breaking the Black Mirror and Other Lessons From Day of Shecurity π΄
π Read
via "Dark Reading".
Diversity brings more varied solutions to major challenges in cybersecurity, just as it does in every other industry.π Read
via "Dark Reading".
Dark Reading
Breaking the Black Mirror and Other Lessons From Day of Shecurity
Diversity brings more varied solutions to major challenges in cybersecurity, just as it does in every other industry.
βΌ CVE-2021-43682 βΌ
π Read
via "National Vulnerability Database".
thinkphp-bjyblog (last update Jun 4 2021) is affected by a Cross Site Scripting (XSS) vulnerability in AdminBaseController.class.php. The exit function will terminate the script and print the message to the user which has $_SERVER['HTTP_HOST'].π Read
via "National Vulnerability Database".
βΌ CVE-2021-43681 βΌ
π Read
via "National Vulnerability Database".
SakuraPanel v1.0.1.1 is affected by a Cross Site Scripting (XSS) vulnerability in /master/core/PostHandler.php. The exit function will terminate the script and print the message $data['proxy_name'].π Read
via "National Vulnerability Database".
βΌ CVE-2021-43686 βΌ
π Read
via "National Vulnerability Database".
nZEDb v0.4.20 is affected by a Cross Site Scripting (XSS) vulnerability in www/pages/api.php. The exit function will terminate the script and print the message which has the input $_GET['t'].π Read
via "National Vulnerability Database".
βΌ CVE-2021-43683 βΌ
π Read
via "National Vulnerability Database".
pictshare v1.5 is affected by a Cross Site Scripting (XSS) vulnerability in api/info.php. The exit function will terminate the script and print the message which has $_REQUEST['hash'].π Read
via "National Vulnerability Database".
π Five Health Providers Held Accountable for Violating HIPAA Right of Access π
π Read
via "".
OCR has shown that its serious about patients being able to access their healthcare records β recently levied penalties serve as a reminder for organizations to know where PHI is at all times.π Read
via "".
Digital Guardian
Five Health Providers Held Accountable for Violating HIPAA Right of Access
OCR has shown that its serious about patients being able to access their healthcare records β recently levied penalties serve as a reminder for organizations to know where PHI is at all times.
βοΈ Ubiquiti Developer Charged With Extortion, Causing 2020 βBreachβ βοΈ
π Read
via "Krebs on Security".
In January 2021, technology vendor Ubiquiti Inc. [NYSE:UI] disclosed that a breach at a third party cloud provider had exposed customer account credentials. In March, a Ubiquiti employee warned that the company had drastically understated the scope of the incident, and that the third-party cloud provider claim was a fabrication. On Wednesday, a former Ubiquiti developer was arrested and charged with stealing data and trying to extort his employer while pretending to be a whistleblower.π Read
via "Krebs on Security".
Krebsonsecurity
Final Thoughts on Ubiquiti
Last year, I posted a series of articles about a purported "breach" at Ubiquiti. My sole source for that reporting was the person who has since been indicted by federal prosecutors for his alleged wrongdoing β which includes providing falseβ¦
π I2P 1.6.1 π
π Read
via "Packet Storm Security".
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.π Read
via "Packet Storm Security".
Packetstormsecurity
I2P 1.6.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ποΈ Ransomware groups increasingly using data leak threats to pile pressure on victims ποΈ
π Read
via "The Daily Swig".
Nearly one in three victims succumb to extortion, estimates Group-IBπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Ransomware groups increasingly using data leak threats to pile pressure on victims
Nearly one in three victims succumb to extortion, estimates Group-IB
π΄ When Will a Cloud Infrastructure Heavyweight Launch a SASE? π΄
π Read
via "Dark Reading".
There's been a veritable gold rush of security vendors getting into secure access service edge. Now will any of the major IaaS vendors enter the market? Rik Turner makes the case.π Read
via "Dark Reading".
Dark Reading
When Will a Cloud Infrastructure Heavyweight Launch a SASE?
There's been a veritable gold rush of security vendors getting into secure access service edge. Now will any of the major IaaS vendors enter the market? Rik Turner makes the case.
β IoT devices must βprotect consumers from cyberharmβ, says UK government β
π Read
via "Naked Security".
"Must be at least THIS tall to go on ride" seems to be the starting point. Too little, too late? Or better than nothing?π Read
via "Naked Security".
Naked Security
IoT devices must βprotect consumers from cyberharmβ, says UK government
βMust be at least THIS tall to go on rideβ seems to be the starting point. Too little, too late? Or better than nothing?