β IoT devices must βprotect consumers from cyberharmβ, says UK government β
π Read
via "Naked Security".
"Must be at least THIS tall to go on ride" seems to be the starting point. Too little, too late? Or better than nothing?π Read
via "Naked Security".
Naked Security
IoT devices must βprotect consumers from cyberharmβ, says UK government
βMust be at least THIS tall to go on rideβ seems to be the starting point. Too little, too late? Or better than nothing?
βΌ CVE-2021-23260 βΌ
π Read
via "National Vulnerability Database".
Authenticated users with Site roles may inject XSS scripts via file names that will execute in the browser for this and other users of the same site.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23262 βΌ
π Read
via "National Vulnerability Database".
Authenticated administrators may modify the main YAML configuration file and load a Java class resulting in RCE.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23263 βΌ
π Read
via "National Vulnerability Database".
Unauthenticated remote attackers can read textual content via FreeMarker including files /scripts/*, /templates/* and some of the files in /.git/* (non-binary).π Read
via "National Vulnerability Database".
βΌ CVE-2021-23258 βΌ
π Read
via "National Vulnerability Database".
Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE).π Read
via "National Vulnerability Database".
βΌ CVE-2021-23259 βΌ
π Read
via "National Vulnerability Database".
Authenticated users with Administrator or Developer roles may execute OS commands by Groovy Script which uses Groovy lib to render a webpage. The groovy script does not have security restrictions, which will cause attackers to execute arbitrary commands remotely(RCE).π Read
via "National Vulnerability Database".
βΌ CVE-2021-23261 βΌ
π Read
via "National Vulnerability Database".
Authenticated administrators may override the system configuration file and cause a denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43679 βΌ
π Read
via "National Vulnerability Database".
ecshop v2.7.3 is affected by a SQL injection vulnerability in shopex\ecshop\upload\api\client\api.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23264 βΌ
π Read
via "National Vulnerability Database".
Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes.π Read
via "National Vulnerability Database".
π΄ Key Characteristics of Malicious Domains: Report π΄
π Read
via "Dark Reading".
Newer top-level domains and certain hosting providers are frequent sources of malicious content, while newly registered domains and free SSL certificates are not any more likely than average to be risky, new research shows.π Read
via "Dark Reading".
Dark Reading
Key Characteristics of Malicious Domains: Report
Newer top-level domains and certain hosting providers are frequent sources of malicious content, while newly registered domains and free SSL certificates are not any more likely than average to be risky, new research shows.
β AT&T Takes Steps to Mitigate Botnet Found Inside Its Network β
π Read
via "Threat Post".
AT&T is battling a modular malware called EwDoor on 5,700 VoIP servers, but it could have a larger wildcard certificate problem.π Read
via "Threat Post".
Threat Post
AT&T Takes Steps to Mitigate Botnet Found Inside Its Network
AT&T is battling a modular malware called EwDoor on 5,700 VoIP servers, but it could have a larger wildcard certificate problem.
β S3 Ep61: Call scammers, cloud insecurity, and facial recognition creepiness [Podcast] β
π Read
via "Naked Security".
Latest episode - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep61: Call scammers, cloud insecurity, and facial recognition creepiness [Podcast]
Latest episode β listen now!
βΌ CVE-2021-3944 βΌ
π Read
via "National Vulnerability Database".
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)π Read
via "National Vulnerability Database".
βΌ CVE-2015-20106 βΌ
π Read
via "National Vulnerability Database".
The ClickBank Affiliate Ads WordPress plugin through 1.20 does not escape its settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.π Read
via "National Vulnerability Database".
βΌ CVE-2015-20105 βΌ
π Read
via "National Vulnerability Database".
The ClickBank Affiliate Ads WordPress plugin through 1.20 does not have CSRF check when saving its settings, allowing attacker to make logged in admin change them via a CSRF attack. Furthermore, due to the lack of escaping when they are outputting, it could also lead to Stored Cross-Site Scripting issuesπ Read
via "National Vulnerability Database".
βΌ CVE-2021-43795 βΌ
π Read
via "National Vulnerability Database".
Armeria is an open source microservice framework. In affected versions an attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic. Armeria 1.13.4 or above contains the hardened path validation logic that handles `%2F` properly. This vulnerability can be worked around by inserting a decorator that performs an additional validation on the request path.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44518 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the eGeeTouch 3rd Generation Travel Padlock application for Android. The lock sends a pairing code before each operation (lock or unlock) activated via the companion app. The code is sent unencrypted, allowing any attacker with the same app (either Android or iOS) to add the lock and take complete control. For successful exploitation, the attacker must be able to touch the lock's power button, and must be able to capture BLE network communication.π Read
via "National Vulnerability Database".
β Planned Parenthood Breach Opens Patients to Follow-On Attacks β
π Read
via "Threat Post".
Cyberattackers made off with addresses, insurance information, dates of birth, and most worryingly, clinical information, such as diagnosis, procedures, and/or prescription information.π Read
via "Threat Post".
Threat Post
Planned Parenthood Breach Opens Patients to Follow-On Attacks
Cyberattackers made off with addresses, insurance information, dates of birth, and most worryingly, clinical information, such as diagnosis, procedures and/or prescription information.
β βDouble-Extortionβ Ransomware Data Leaks Skyrocket 935% β
π Read
via "Threat Post".
Startling triple-digit growth is fueled by easy criminal access to corporate networks and RaaS tools, an analysis found.π Read
via "Threat Post".
Threat Post
βDouble-Extortionβ Ransomware Damage Skyrockets 935%
Startling triple-digit growth is fueled by easy criminal access to corporate networks and RaaS tools, an analysis found.
π¦Ώ Insider threats: How trustworthy are your employees? π¦Ώ
π Read
via "Tech Republic".
While we often worry about outside threats to our business data, insider threats are a growing problem. Here's how to secure your business.π Read
via "Tech Republic".
TechRepublic
Insider threats: How trustworthy are your employees?
While we often worry about outside threats to our business data, insider threats are a growing problem. Here's how to secure your business.
π΄ Planned Parenthood LA Breach Compromises 400,000 Patients' Data π΄
π Read
via "Dark Reading".
The breach, which compromised data such as insurance details and prescription information, took place between Oct. 9 and Oct. 17.π Read
via "Dark Reading".
Dark Reading
Planned Parenthood LA Breach Compromises 400,000 Patients' Data
The breach, which compromised data such as insurance details and prescription information, took place between Oct. 9 and Oct. 17.