βΌ CVE-2021-21950 βΌ
π Read
via "National Vulnerability Database".
An out-of-bounds write vulnerability exists in the CMD_DEVICE_GET_SERVER_LIST_REQUEST functionality of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h in function recv_server_device_response_msg_process. A specially-crafted network packet can lead to code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44529 βΌ
π Read
via "National Vulnerability Database".
A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).π Read
via "National Vulnerability Database".
βΌ CVE-2021-43546 βΌ
π Read
via "National Vulnerability Database".
It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.π Read
via "National Vulnerability Database".
π¦Ώ Android malware infected more than 300,000 devices with banking trojans π¦Ώ
π Read
via "Tech Republic".
The initial apps in Google Play were safe, but the creators found a way around the Play Store's protections to install malware on Android users' devices. Here's how it happened and how to stay safe.π Read
via "Tech Republic".
TechRepublic
Android malware infected more than 300,000 devices with banking trojans
The initial apps in Google Play were safe, but the creators found a way around the Play Store's protections to install malware on Android users' devices. Here's how it happened and how to stay safe.
βΌ CVE-2021-43811 βΌ
π Read
via "National Vulnerability Database".
Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.π Read
via "National Vulnerability Database".
βοΈ Canada Charges Its βMost Prolific Cybercriminalβ βοΈ
π Read
via "Krebs on Security".
A 31-year-old Canadian man has been arrested and charged with fraud in connection with numerous ransomware attacks against businesses, government agencies and private citizens throughout Canada and the United States. Canadian authorities describe him as "the most prolific cybercriminal we've identified in Canada," but so far they've released few other details about the investigation or the defendant. Helpfully, an email address and nickname apparently connected to the accused offer some additional clues.π Read
via "Krebs on Security".
Krebsonsecurity
Canada Charges Its βMost Prolific Cybercriminalβ
A 31-year-old Canadian man has been arrested and charged with fraud in connection with numerous ransomware attacks against businesses, government agencies and private citizens throughout Canada and the United States. Canadian authorities describe him as "theβ¦
βΌ CVE-2021-3817 βΌ
π Read
via "National Vulnerability Database".
wbce_cms is vulnerable to Improper Neutralization of Special Elements used in an SQL Commandπ Read
via "National Vulnerability Database".
ποΈ Grafana urges web devs to update following path traversal bug disclosure ποΈ
π Read
via "The Daily Swig".
βWith all good intentions, I had placed the Grafana team in a bit of a stressful situationβ, researcher admitsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Grafana urges web devs to update following path traversal bug disclosure
βWith all good intentions, I had placed the Grafana team in a bit of a stressful situation,β researcher admits
π΄ Intel 471 Forms Tech Alliance With CyCognito π΄
π Read
via "Dark Reading".
Enterprises will see improved access to data and more relevant insights that will enable them to further strengthen their cybersecurity postures.π Read
via "Dark Reading".
Dark Reading
Intel 471 Forms Tech Alliance With CyCognito
Enterprises will see improved access to data and more relevant insights that will enable them to further strengthen their cybersecurity postures.
π΄ (ISC)Β² Welcomes Students to Apply for its Undergraduate, Graduate, and Women's Cybersecurity Scholarships π΄
π Read
via "Dark Reading".
Scholarships are part of an effort to bridge the cybersecurity workforce gap.π Read
via "Dark Reading".
Dark Reading
(ISC)Β² Welcomes Students to Apply for its Undergraduate, Graduate, and Women's Cybersecurity Scholarships
Scholarships are part of an effort to bridge the cybersecurity workforce gap.
π΄ Zscaler Extends Zero Trust Exchange Platform to Deliver Zero Trust for Workloads π΄
π Read
via "Dark Reading".
Solution secures cloud-to-Internet, cloud-to-cloud, cloud-to-data center, and intra-cloud communications.π Read
via "Dark Reading".
Dark Reading
Zscaler Extends Zero Trust Exchange Platform to Deliver Zero Trust for Workloads
Solution secures cloud-to-Internet, cloud-to-cloud, cloud-to-data center, and intra-cloud communications.
π΄ IRONSCALES Raises $64 Million in Series C Funding Round Led by PSG π΄
π Read
via "Dark Reading".
Investment aims to accelerate growth through continued product innovation and global expansion.π Read
via "Dark Reading".
Dark Reading
IRONSCALES Raises $64 Million in Series C Funding Round Led by PSG
Investment aims to accelerate growth through continued product innovation and global expansion.
π΄ The Executive Women's Forum on Information Security, Risk Management & Privacy Presents the Leadership Scholarship π΄
π Read
via "Dark Reading".
Scholarship's goal is to advance women in cybersecurity, risk, and privacy.π Read
via "Dark Reading".
Dark Reading
The Executive Women's Forum on Information Security, Risk Management & Privacy Presents the Leadership Scholarship
Scholarship's goal is to advance women in cybersecurity, risk, and privacy.
π΄ How to Build a Better Internal Fraud Protection Program π΄
π Read
via "Dark Reading".
Fraud awareness training is just the beginning.π Read
via "Dark Reading".
Dark Reading
How to Build a Better Internal Fraud Protection Program
Fraud awareness training is just the beginning.
ποΈ US food importer Atalanta admits ransomware attack ποΈ
π Read
via "The Daily Swig".
Multiple questions remain about July data breachπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
US food importer Atalanta admits ransomware attack
Multiple questions remain about July data breach
βΌ CVE-2021-22565 βΌ
π Read
via "National Vulnerability Database".
An attacker could prematurely expire a verification code, making it unusable by the patient, making the patient unable to upload their TEKs to generate exposure notifications. We recommend upgrading the Exposure Notification server to V1.1.2 or greater.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41449 βΌ
π Read
via "National Vulnerability Database".
A path traversal attack in web interfaces of Netgear RAX35, RAX38, and RAX40 routers before v1.0.4.102, allows a remote unauthenticated attacker to gain access to sensitive restricted information, such as forbidden files of the web application, via sending a specially crafted HTTP packet.π Read
via "National Vulnerability Database".
β How MikroTik Routers Became a Cybercriminal Target β
π Read
via "Threat Post".
The powerful devices leveraged by the Meris botnet have weaknesses that make them easy to exploit, yet complex for organizations to track and secure, researchers said.π Read
via "Threat Post".
Threat Post
How MikroTik Routers Became a Cybercriminal Target
The powerful devices leveraged by the Meris botnet have weaknesses that make them easy to exploit, yet complex for organizations to track and secure, researchers said.
ποΈ OWASP ModSecurity Core Rule Set sandbox launched to help security researchers test new CVEs ποΈ
π Read
via "The Daily Swig".
Free-to-use feature can help users gauge whether the CRS protects against payloadsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
OWASP ModSecurity Core Rule Set sandbox launched to help security researchers test new CVEs
Free-to-use feature can help users gauge whether the CRS protects against payloads
π΄ LastPass Announces New Integration with Google Workspace π΄
π Read
via "Dark Reading".
The latest integration furthers the companyβs mission to provide an unmatched security model for businesses, without adding complexity for users.π Read
via "Dark Reading".
Dark Reading
LastPass Announces New Integration with Google Workspace
The latest integration furthers the companyβs mission to provide an unmatched security model for businesses, without adding complexity for users.
π¦Ώ How a phishing campaign is able to exploit Microsoft Outlook π¦Ώ
π Read
via "Tech Republic".
Attackers can capitalize on a feature in Outlook that makes spoofed messages appear legitimate, says email security provider Avanan.π Read
via "Tech Republic".
TechRepublic
How a phishing campaign is able to exploit Microsoft Outlook
Attackers can capitalize on a feature in Outlook that makes spoofed messages appear legitimate, says email security provider Avanan.