βΌ CVE-2021-4082 βΌ
π Read
via "National Vulnerability Database".
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)π Read
via "National Vulnerability Database".
β βKarakurtβ Extortion Threat Emerges, But Says No to Ransomware β
π Read
via "Threat Post".
The threat group, first identified in June, focuses solely on data exfiltration and subsequent extortion, and has already targeted 40 victims since September.π Read
via "Threat Post".
Threat Post
βKarakurtβ Extortion Threat Emerges, But Says No to Ransomware
The threat group, first identified in June, focuses solely on data exfiltration and subsequent extortion, and has already targeted 40 victims since September.
ποΈ βLog4Shellβ vulnerability poses critical threat to applications using βubiquitousβ Java logging package Apache Log4j ποΈ
π Read
via "The Daily Swig".
Wide range of enterprise software impacted by CVSS 10-rated bugπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
βLog4Shellβ vulnerability poses critical threat to applications using βubiquitousβ Java logging package Apache Log4j
βScope and potential impact unlike any component vulnerability I can recallβ
π΄ The Vulnerability Lag: Cut Ransomware Risks Resulting From Digital Transformation π΄
π Read
via "Dark Reading".
Exploring ransomware and other data integrity risks from accelerated digital transformation in the wake of COVID-19.π Read
via "Dark Reading".
Dark Reading
The Vulnerability Lag: Cut Ransomware Risks Resulting From Digital Transformation
Exploring ransomware and other data integrity risks from accelerated digital transformation in the wake of COVID-19.
π nfstream 6.4.0 π
π Read
via "Packet Storm Security".
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.π Read
via "Packet Storm Security".
Packetstormsecurity
nfstream 6.4.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
βΌ CVE-2021-37187 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may read a password file (with reversible passwords) from the device, which allows decoding of other users' passwords.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37188 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may load customized firmware (because the bootloader does not verify that it is authentic), changing the behavior of the gateway.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40834 βΌ
π Read
via "National Vulnerability Database".
A user interface overlay vulnerability was discovered in F-secure SAFE Browser for Android. When user click on a specially crafted seemingly legitimate URL SAFE browser goes into full screen and hides the user interface. A remote attacker can leverage this to perform spoofing attack.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37189 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered on Digi TransPort Gateway devices through 5.2.13.4. They do not set the Secure attribute for sensitive cookies in HTTPS sessions, which could cause the user agent to send those cookies in cleartext over an HTTP session.π Read
via "National Vulnerability Database".
βΌ CVE-2021-35978 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Digi TransPort DR64, SR44 VC74, and WR. The ZING protocol allows arbitrary remote command execution with SUPER privileges. This allows an attacker (with knowledge of the protocol) to execute arbitrary code on the controller including overwriting firmware, adding/removing users, disabling the internal firewall, etc.π Read
via "National Vulnerability Database".
ποΈ Russian man sentenced to prison for βcryptingβ service that concealed malware from antivirus programs ποΈ
π Read
via "The Daily Swig".
Underground service promised to render malicious software fully undetectable by nearly every major antivirus providerπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Russian man sentenced to prison for βcryptingβ service that concealed malware from antivirus programs
Underground service promised to render malicious software fully undetectable by nearly every major antivirus provider
β Sprawling Active Attack Aims to Take Over 1.6M WordPress Sites β
π Read
via "Threat Post".
Cyberattackers are targeting security vulnerabilities in four plugins plus Epsilon themes, to assign themselves administrative accounts.π Read
via "Threat Post".
Threat Post
Sprawling Active Attack Aims to Take Over 1.6M WordPress Sites
Cyberattackers are targeting security vulnerabilities in four plugins plus Epsilon themes, to assign themselves administrative accounts.
β βLog4Shellβ Java vulnerability β how to safeguard your servers β
π Read
via "Naked Security".
Just when you thought it was safe to relax for the weekend... a critical bug showed up in Apache's Log4j productπ Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Dark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson π΄
π Read
via "Dark Reading".
The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and editor-in-chief Tim Wilson, an influential editor and well-respected thought leader in the cybersecurity industry.π Read
via "Dark Reading".
Dark Reading
Dark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson
The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and editor-in-chief Tim Wilson, an influential editor and well-respected thought leader in the cybersecurity industry.
π Friday Five 12/10 π
π Read
via "".
Five things CIOs want from their CEOs, Google and Microsoft crack down on hackers, and how to prepare for forthcoming privacy laws - catch up on the infosec news of the week with the Friday Five!π Read
via "".
Digital Guardian
Friday Five 12/10
Five things CIOs want from their CEOs, Google and Microsoft crack down on hackers, and how to prepare for forthcoming privacy laws - catch up on the infosec news of the week with the Friday Five!
βΌ CVE-2021-3829 βΌ
π Read
via "National Vulnerability Database".
openwhyd is vulnerable to URL Redirection to Untrusted Siteπ Read
via "National Vulnerability Database".
π΄ Identity Authentication Access Market Set to Hit $28.9B in 2021 π΄
π Read
via "Dark Reading".
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers and trends are explored.π Read
via "Dark Reading".
Dark Reading
Identity Authentication Access Market Set to Hit $28.9B in 2021
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers, and trends are explored.
β Zero Day in Ubiquitous Apache Log4j Tool Under Active Attack β
π Read
via "Threat Post".
The Log4Shell vulnerability critically threatens anybody using the popular open-source Apache Struts framework and could lead to a βMini internet meltdown soonish.βπ Read
via "Threat Post".
Threat Post
Zero Day in Ubiquitous Apache Log4j Tool Under Active Attack
The Log4Shell vulnerability critically threatens anybody using the popular open-source Apache Struts framework and could lead to a βMini internet meltdown soonish.β
β βAppallingβ Riot Games Job Fraud Takes Aim at Wallets β
π Read
via "Threat Post".
Scammers are using fake job listings to empty the wallets of young, hopeful victims looking to break into the gaming industry.π Read
via "Threat Post".
Threat Post
βAppallingβ Riot Games Job Fraud Takes Aim at Wallets
Scammers are using fake job listings to empty the wallets of young, hopeful victims looking to break into the gaming industry.
βΌ CVE-2021-38917 βΌ
π Read
via "National Vulnerability Database".
IBM PowerVM Hypervisor FW860, FW940, and FW950 could allow an attacker that gains service access to the FSP can read and write arbitrary host system memory through a series of carefully crafted service procedures. IBM X-Force ID: 210018.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31745 βΌ
π Read
via "National Vulnerability Database".
Session Fixation vulnerability in login.php in Pluck-CMS Pluck 4.7.15 allows an attacker to sustain unauthorized access to the platform. Because Pluck does not invalidate prior sessions after a password change, access can be sustained even after an administrator performs regular remediation attempts such as resetting their password.π Read
via "National Vulnerability Database".