π΄ IRONSCALES Raises $64 Million in Series C Funding Round Led by PSG π΄
π Read
via "Dark Reading".
Investment aims to accelerate growth through continued product innovation and global expansion.π Read
via "Dark Reading".
Dark Reading
IRONSCALES Raises $64 Million in Series C Funding Round Led by PSG
Investment aims to accelerate growth through continued product innovation and global expansion.
π΄ The Executive Women's Forum on Information Security, Risk Management & Privacy Presents the Leadership Scholarship π΄
π Read
via "Dark Reading".
Scholarship's goal is to advance women in cybersecurity, risk, and privacy.π Read
via "Dark Reading".
Dark Reading
The Executive Women's Forum on Information Security, Risk Management & Privacy Presents the Leadership Scholarship
Scholarship's goal is to advance women in cybersecurity, risk, and privacy.
π΄ How to Build a Better Internal Fraud Protection Program π΄
π Read
via "Dark Reading".
Fraud awareness training is just the beginning.π Read
via "Dark Reading".
Dark Reading
How to Build a Better Internal Fraud Protection Program
Fraud awareness training is just the beginning.
ποΈ US food importer Atalanta admits ransomware attack ποΈ
π Read
via "The Daily Swig".
Multiple questions remain about July data breachπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
US food importer Atalanta admits ransomware attack
Multiple questions remain about July data breach
βΌ CVE-2021-22565 βΌ
π Read
via "National Vulnerability Database".
An attacker could prematurely expire a verification code, making it unusable by the patient, making the patient unable to upload their TEKs to generate exposure notifications. We recommend upgrading the Exposure Notification server to V1.1.2 or greater.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41449 βΌ
π Read
via "National Vulnerability Database".
A path traversal attack in web interfaces of Netgear RAX35, RAX38, and RAX40 routers before v1.0.4.102, allows a remote unauthenticated attacker to gain access to sensitive restricted information, such as forbidden files of the web application, via sending a specially crafted HTTP packet.π Read
via "National Vulnerability Database".
β How MikroTik Routers Became a Cybercriminal Target β
π Read
via "Threat Post".
The powerful devices leveraged by the Meris botnet have weaknesses that make them easy to exploit, yet complex for organizations to track and secure, researchers said.π Read
via "Threat Post".
Threat Post
How MikroTik Routers Became a Cybercriminal Target
The powerful devices leveraged by the Meris botnet have weaknesses that make them easy to exploit, yet complex for organizations to track and secure, researchers said.
ποΈ OWASP ModSecurity Core Rule Set sandbox launched to help security researchers test new CVEs ποΈ
π Read
via "The Daily Swig".
Free-to-use feature can help users gauge whether the CRS protects against payloadsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
OWASP ModSecurity Core Rule Set sandbox launched to help security researchers test new CVEs
Free-to-use feature can help users gauge whether the CRS protects against payloads
π΄ LastPass Announces New Integration with Google Workspace π΄
π Read
via "Dark Reading".
The latest integration furthers the companyβs mission to provide an unmatched security model for businesses, without adding complexity for users.π Read
via "Dark Reading".
Dark Reading
LastPass Announces New Integration with Google Workspace
The latest integration furthers the companyβs mission to provide an unmatched security model for businesses, without adding complexity for users.
π¦Ώ How a phishing campaign is able to exploit Microsoft Outlook π¦Ώ
π Read
via "Tech Republic".
Attackers can capitalize on a feature in Outlook that makes spoofed messages appear legitimate, says email security provider Avanan.π Read
via "Tech Republic".
TechRepublic
How a phishing campaign is able to exploit Microsoft Outlook
Attackers can capitalize on a feature in Outlook that makes spoofed messages appear legitimate, says email security provider Avanan.
βΌ CVE-2021-20143 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated command injection vulnerability exists in the parameters of operation 48 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41246 βΌ
π Read
via "National Vulnerability Database".
Express OpenID Connect is express JS middleware implementing sign on for Express web apps using OpenID Connect. Versions before and including `2.5.1` do not regenerate the session id and session cookie when user logs in. This behavior opens up the application to various session fixation vulnerabilities. Versions `2.5.2` contains a patch for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20142 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated command injection vulnerability exists in the parameters of operation 41 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40280 βΌ
π Read
via "National Vulnerability Database".
An SQL Injection vulnerablitly exits in zzcms 8.2, 8.3, 2020, and 2021 via the id parameter in admin/dl_sendmail.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41696 βΌ
π Read
via "National Vulnerability Database".
An authentication bypass (account takeover) vulnerability exists in Premiumdatingscript 4.2.7.7 due to a weak password reset mechanism in requests\user.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-4038 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability in McAfee Network Security Manager (NSM) prior to 10.1 Minor 7 allows a remote authenticated administrator to embed a XSS in the administrator interface via specially crafted custom rules containing HTML. NSM did not correctly sanitize custom rule content in all scenarios.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21955 βΌ
π Read
via "National Vulnerability Database".
An authentication bypass vulnerability exists in the get_aes_key_info_by_packetid() function of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. Generic network sniffing can lead to password recovery. An attacker can sniff network traffic to trigger this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20139 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated command injection vulnerability exists in the parameters of operation 3 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20146 βΌ
π Read
via "National Vulnerability Database".
An unprotected ssh private key exists on the Gryphon devices which could be used to achieve root access to a server affiliated with Gryphon's development and infrastructure. At the time of discovery, the ssh key could be used to login to the development server hosted in Amazon Web Services.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20140 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated command injection vulnerability exists in the parameters of operation 10 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40279 βΌ
π Read
via "National Vulnerability Database".
An SQL Injection vulnerability exists in zzcms 8.2, 8.3, 2020, and 2021 via the id parameter in admin/bad.php.π Read
via "National Vulnerability Database".