πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-37187 β€Ό

An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may read a password file (with reversible passwords) from the device, which allows decoding of other users' passwords.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37188 β€Ό

An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may load customized firmware (because the bootloader does not verify that it is authentic), changing the behavior of the gateway.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40834 β€Ό

A user interface overlay vulnerability was discovered in F-secure SAFE Browser for Android. When user click on a specially crafted seemingly legitimate URL SAFE browser goes into full screen and hides the user interface. A remote attacker can leverage this to perform spoofing attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37189 β€Ό

An issue was discovered on Digi TransPort Gateway devices through 5.2.13.4. They do not set the Secure attribute for sensitive cookies in HTTPS sessions, which could cause the user agent to send those cookies in cleartext over an HTTP session.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35978 β€Ό

An issue was discovered in Digi TransPort DR64, SR44 VC74, and WR. The ZING protocol allows arbitrary remote command execution with SUPER privileges. This allows an attacker (with knowledge of the protocol) to execute arbitrary code on the controller including overwriting firmware, adding/removing users, disabling the internal firewall, etc.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Russian man sentenced to prison for β€˜crypting’ service that concealed malware from antivirus programs πŸ—“οΈ

Underground service promised to render malicious software fully undetectable by nearly every major antivirus provider

πŸ“– Read

via "The Daily Swig".
❌ Sprawling Active Attack Aims to Take Over 1.6M WordPress Sites ❌

Cyberattackers are targeting security vulnerabilities in four plugins plus Epsilon themes, to assign themselves administrative accounts.

πŸ“– Read

via "Threat Post".
⚠ β€œLog4Shell” Java vulnerability – how to safeguard your servers ⚠

Just when you thought it was safe to relax for the weekend... a critical bug showed up in Apache's Log4j product

πŸ“– Read

via "Naked Security".
πŸ•΄ Dark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson πŸ•΄

The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and editor-in-chief Tim Wilson, an influential editor and well-respected thought leader in the cybersecurity industry.

πŸ“– Read

via "Dark Reading".
πŸ” Friday Five 12/10 πŸ”

Five things CIOs want from their CEOs, Google and Microsoft crack down on hackers, and how to prepare for forthcoming privacy laws - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
β€Ό CVE-2021-3829 β€Ό

openwhyd is vulnerable to URL Redirection to Untrusted Site

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Identity Authentication Access Market Set to Hit $28.9B in 2021 πŸ•΄

With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers and trends are explored.

πŸ“– Read

via "Dark Reading".
❌ Zero Day in Ubiquitous Apache Log4j Tool Under Active Attack ❌

The Log4Shell vulnerability critically threatens anybody using the popular open-source Apache Struts framework and could lead to a β€œMini internet meltdown soonish.”

πŸ“– Read

via "Threat Post".
❌ β€˜Appalling’ Riot Games Job Fraud Takes Aim at Wallets ❌

Scammers are using fake job listings to empty the wallets of young, hopeful victims looking to break into the gaming industry.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-38917 β€Ό

IBM PowerVM Hypervisor FW860, FW940, and FW950 could allow an attacker that gains service access to the FSP can read and write arbitrary host system memory through a series of carefully crafted service procedures. IBM X-Force ID: 210018.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31745 β€Ό

Session Fixation vulnerability in login.php in Pluck-CMS Pluck 4.7.15 allows an attacker to sustain unauthorized access to the platform. Because Pluck does not invalidate prior sessions after a password change, access can be sustained even after an administrator performs regular remediation attempts such as resetting their password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36911 β€Ό

Stored Cross-Site Scripting (XSS) vulnerability discovered in WordPress Comment Engine Pro plugin (versions <= 1.0), could be exploited by users with Editor or higher role.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37935 β€Ό

An information disclosure vulnerability in the login page of Huntflow Enterprise before 3.10.4 could allow an unauthenticated, remote user to get information about the domain name of the configured LDAP server. An attacker could exploit this vulnerability by requesting the login page and searching for the "isLdap" JavaScript parameter in the HTML source code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38937 β€Ό

IBM PowerVM Hypervisor FW940, FW950, and FW1010 could allow an authenticated user to cause the system to crash using a specially crafted IBMi Hypervisor call. IBM X-Force ID: 210894.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37934 β€Ό

Due to insufficient server-side login-attempt limit enforcement, a vulnerability in /account/login in Huntflow Enterprise before 3.10.14 could allow an unauthenticated, remote user to perform multiple login attempts for brute-force password guessing.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43813 β€Ό

Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.

πŸ“– Read

via "National Vulnerability Database".