βΌ CVE-2021-43683 βΌ
π Read
via "National Vulnerability Database".
pictshare v1.5 is affected by a Cross Site Scripting (XSS) vulnerability in api/info.php. The exit function will terminate the script and print the message which has $_REQUEST['hash'].π Read
via "National Vulnerability Database".
π Five Health Providers Held Accountable for Violating HIPAA Right of Access π
π Read
via "".
OCR has shown that its serious about patients being able to access their healthcare records β recently levied penalties serve as a reminder for organizations to know where PHI is at all times.π Read
via "".
Digital Guardian
Five Health Providers Held Accountable for Violating HIPAA Right of Access
OCR has shown that its serious about patients being able to access their healthcare records β recently levied penalties serve as a reminder for organizations to know where PHI is at all times.
βοΈ Ubiquiti Developer Charged With Extortion, Causing 2020 βBreachβ βοΈ
π Read
via "Krebs on Security".
In January 2021, technology vendor Ubiquiti Inc. [NYSE:UI] disclosed that a breach at a third party cloud provider had exposed customer account credentials. In March, a Ubiquiti employee warned that the company had drastically understated the scope of the incident, and that the third-party cloud provider claim was a fabrication. On Wednesday, a former Ubiquiti developer was arrested and charged with stealing data and trying to extort his employer while pretending to be a whistleblower.π Read
via "Krebs on Security".
Krebsonsecurity
Final Thoughts on Ubiquiti
Last year, I posted a series of articles about a purported "breach" at Ubiquiti. My sole source for that reporting was the person who has since been indicted by federal prosecutors for his alleged wrongdoing β which includes providing falseβ¦
π I2P 1.6.1 π
π Read
via "Packet Storm Security".
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.π Read
via "Packet Storm Security".
Packetstormsecurity
I2P 1.6.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ποΈ Ransomware groups increasingly using data leak threats to pile pressure on victims ποΈ
π Read
via "The Daily Swig".
Nearly one in three victims succumb to extortion, estimates Group-IBπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Ransomware groups increasingly using data leak threats to pile pressure on victims
Nearly one in three victims succumb to extortion, estimates Group-IB
π΄ When Will a Cloud Infrastructure Heavyweight Launch a SASE? π΄
π Read
via "Dark Reading".
There's been a veritable gold rush of security vendors getting into secure access service edge. Now will any of the major IaaS vendors enter the market? Rik Turner makes the case.π Read
via "Dark Reading".
Dark Reading
When Will a Cloud Infrastructure Heavyweight Launch a SASE?
There's been a veritable gold rush of security vendors getting into secure access service edge. Now will any of the major IaaS vendors enter the market? Rik Turner makes the case.
β IoT devices must βprotect consumers from cyberharmβ, says UK government β
π Read
via "Naked Security".
"Must be at least THIS tall to go on ride" seems to be the starting point. Too little, too late? Or better than nothing?π Read
via "Naked Security".
Naked Security
IoT devices must βprotect consumers from cyberharmβ, says UK government
βMust be at least THIS tall to go on rideβ seems to be the starting point. Too little, too late? Or better than nothing?
βΌ CVE-2021-23260 βΌ
π Read
via "National Vulnerability Database".
Authenticated users with Site roles may inject XSS scripts via file names that will execute in the browser for this and other users of the same site.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23262 βΌ
π Read
via "National Vulnerability Database".
Authenticated administrators may modify the main YAML configuration file and load a Java class resulting in RCE.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23263 βΌ
π Read
via "National Vulnerability Database".
Unauthenticated remote attackers can read textual content via FreeMarker including files /scripts/*, /templates/* and some of the files in /.git/* (non-binary).π Read
via "National Vulnerability Database".
βΌ CVE-2021-23258 βΌ
π Read
via "National Vulnerability Database".
Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE).π Read
via "National Vulnerability Database".
βΌ CVE-2021-23259 βΌ
π Read
via "National Vulnerability Database".
Authenticated users with Administrator or Developer roles may execute OS commands by Groovy Script which uses Groovy lib to render a webpage. The groovy script does not have security restrictions, which will cause attackers to execute arbitrary commands remotely(RCE).π Read
via "National Vulnerability Database".
βΌ CVE-2021-23261 βΌ
π Read
via "National Vulnerability Database".
Authenticated administrators may override the system configuration file and cause a denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43679 βΌ
π Read
via "National Vulnerability Database".
ecshop v2.7.3 is affected by a SQL injection vulnerability in shopex\ecshop\upload\api\client\api.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23264 βΌ
π Read
via "National Vulnerability Database".
Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes.π Read
via "National Vulnerability Database".
π΄ Key Characteristics of Malicious Domains: Report π΄
π Read
via "Dark Reading".
Newer top-level domains and certain hosting providers are frequent sources of malicious content, while newly registered domains and free SSL certificates are not any more likely than average to be risky, new research shows.π Read
via "Dark Reading".
Dark Reading
Key Characteristics of Malicious Domains: Report
Newer top-level domains and certain hosting providers are frequent sources of malicious content, while newly registered domains and free SSL certificates are not any more likely than average to be risky, new research shows.
β AT&T Takes Steps to Mitigate Botnet Found Inside Its Network β
π Read
via "Threat Post".
AT&T is battling a modular malware called EwDoor on 5,700 VoIP servers, but it could have a larger wildcard certificate problem.π Read
via "Threat Post".
Threat Post
AT&T Takes Steps to Mitigate Botnet Found Inside Its Network
AT&T is battling a modular malware called EwDoor on 5,700 VoIP servers, but it could have a larger wildcard certificate problem.
β S3 Ep61: Call scammers, cloud insecurity, and facial recognition creepiness [Podcast] β
π Read
via "Naked Security".
Latest episode - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep61: Call scammers, cloud insecurity, and facial recognition creepiness [Podcast]
Latest episode β listen now!
βΌ CVE-2021-3944 βΌ
π Read
via "National Vulnerability Database".
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)π Read
via "National Vulnerability Database".
βΌ CVE-2015-20106 βΌ
π Read
via "National Vulnerability Database".
The ClickBank Affiliate Ads WordPress plugin through 1.20 does not escape its settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.π Read
via "National Vulnerability Database".
βΌ CVE-2015-20105 βΌ
π Read
via "National Vulnerability Database".
The ClickBank Affiliate Ads WordPress plugin through 1.20 does not have CSRF check when saving its settings, allowing attacker to make logged in admin change them via a CSRF attack. Furthermore, due to the lack of escaping when they are outputting, it could also lead to Stored Cross-Site Scripting issuesπ Read
via "National Vulnerability Database".