πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-43811 β€Ό

Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ Canada Charges Its β€œMost Prolific Cybercriminal” β™ŸοΈ

A 31-year-old Canadian man has been arrested and charged with fraud in connection with numerous ransomware attacks against businesses, government agencies and private citizens throughout Canada and the United States. Canadian authorities describe him as "the most prolific cybercriminal we've identified in Canada," but so far they've released few other details about the investigation or the defendant. Helpfully, an email address and nickname apparently connected to the accused offer some additional clues.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2021-3817 β€Ό

wbce_cms is vulnerable to Improper Neutralization of Special Elements used in an SQL Command

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Grafana urges web devs to update following path traversal bug disclosure πŸ—“οΈ

β€˜With all good intentions, I had placed the Grafana team in a bit of a stressful situation’, researcher admits

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Intel 471 Forms Tech Alliance With CyCognito πŸ•΄

Enterprises will see improved access to data and more relevant insights that will enable them to further strengthen their cybersecurity postures.

πŸ“– Read

via "Dark Reading".
πŸ•΄ (ISC)Β² Welcomes Students to Apply for its Undergraduate, Graduate, and Women's Cybersecurity Scholarships πŸ•΄

Scholarships are part of an effort to bridge the cybersecurity workforce gap.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Zscaler Extends Zero Trust Exchange Platform to Deliver Zero Trust for Workloads πŸ•΄

Solution secures cloud-to-Internet, cloud-to-cloud, cloud-to-data center, and intra-cloud communications.

πŸ“– Read

via "Dark Reading".
πŸ•΄ IRONSCALES Raises $64 Million in Series C Funding Round Led by PSG πŸ•΄

Investment aims to accelerate growth through continued product innovation and global expansion.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Executive Women's Forum on Information Security, Risk Management & Privacy Presents the Leadership Scholarship πŸ•΄

Scholarship's goal is to advance women in cybersecurity, risk, and privacy.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How to Build a Better Internal Fraud Protection Program πŸ•΄

Fraud awareness training is just the beginning.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ US food importer Atalanta admits ransomware attack πŸ—“οΈ

Multiple questions remain about July data breach

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-22565 β€Ό

An attacker could prematurely expire a verification code, making it unusable by the patient, making the patient unable to upload their TEKs to generate exposure notifications. We recommend upgrading the Exposure Notification server to V1.1.2 or greater.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41449 β€Ό

A path traversal attack in web interfaces of Netgear RAX35, RAX38, and RAX40 routers before v1.0.4.102, allows a remote unauthenticated attacker to gain access to sensitive restricted information, such as forbidden files of the web application, via sending a specially crafted HTTP packet.

πŸ“– Read

via "National Vulnerability Database".
❌ How MikroTik Routers Became a Cybercriminal Target ❌

The powerful devices leveraged by the Meris botnet have weaknesses that make them easy to exploit, yet complex for organizations to track and secure, researchers said.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ OWASP ModSecurity Core Rule Set sandbox launched to help security researchers test new CVEs πŸ—“οΈ

Free-to-use feature can help users gauge whether the CRS protects against payloads

πŸ“– Read

via "The Daily Swig".
πŸ•΄ LastPass Announces New Integration with Google Workspace πŸ•΄

The latest integration furthers the company’s mission to provide an unmatched security model for businesses, without adding complexity for users.

πŸ“– Read

via "Dark Reading".
🦿 How a phishing campaign is able to exploit Microsoft Outlook 🦿

Attackers can capitalize on a feature in Outlook that makes spoofed messages appear legitimate, says email security provider Avanan.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-20143 β€Ό

An unauthenticated command injection vulnerability exists in the parameters of operation 48 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41246 β€Ό

Express OpenID Connect is express JS middleware implementing sign on for Express web apps using OpenID Connect. Versions before and including `2.5.1` do not regenerate the session id and session cookie when user logs in. This behavior opens up the application to various session fixation vulnerabilities. Versions `2.5.2` contains a patch for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20142 β€Ό

An unauthenticated command injection vulnerability exists in the parameters of operation 41 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40280 β€Ό

An SQL Injection vulnerablitly exits in zzcms 8.2, 8.3, 2020, and 2021 via the id parameter in admin/dl_sendmail.php.

πŸ“– Read

via "National Vulnerability Database".