β Sprawling Active Attack Aims to Take Over 1.6M WordPress Sites β
π Read
via "Threat Post".
Cyberattackers are targeting security vulnerabilities in four plugins plus Epsilon themes, to assign themselves administrative accounts.π Read
via "Threat Post".
Threat Post
Sprawling Active Attack Aims to Take Over 1.6M WordPress Sites
Cyberattackers are targeting security vulnerabilities in four plugins plus Epsilon themes, to assign themselves administrative accounts.
β βLog4Shellβ Java vulnerability β how to safeguard your servers β
π Read
via "Naked Security".
Just when you thought it was safe to relax for the weekend... a critical bug showed up in Apache's Log4j productπ Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Dark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson π΄
π Read
via "Dark Reading".
The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and editor-in-chief Tim Wilson, an influential editor and well-respected thought leader in the cybersecurity industry.π Read
via "Dark Reading".
Dark Reading
Dark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson
The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and editor-in-chief Tim Wilson, an influential editor and well-respected thought leader in the cybersecurity industry.
π Friday Five 12/10 π
π Read
via "".
Five things CIOs want from their CEOs, Google and Microsoft crack down on hackers, and how to prepare for forthcoming privacy laws - catch up on the infosec news of the week with the Friday Five!π Read
via "".
Digital Guardian
Friday Five 12/10
Five things CIOs want from their CEOs, Google and Microsoft crack down on hackers, and how to prepare for forthcoming privacy laws - catch up on the infosec news of the week with the Friday Five!
βΌ CVE-2021-3829 βΌ
π Read
via "National Vulnerability Database".
openwhyd is vulnerable to URL Redirection to Untrusted Siteπ Read
via "National Vulnerability Database".
π΄ Identity Authentication Access Market Set to Hit $28.9B in 2021 π΄
π Read
via "Dark Reading".
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers and trends are explored.π Read
via "Dark Reading".
Dark Reading
Identity Authentication Access Market Set to Hit $28.9B in 2021
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers, and trends are explored.
β Zero Day in Ubiquitous Apache Log4j Tool Under Active Attack β
π Read
via "Threat Post".
The Log4Shell vulnerability critically threatens anybody using the popular open-source Apache Struts framework and could lead to a βMini internet meltdown soonish.βπ Read
via "Threat Post".
Threat Post
Zero Day in Ubiquitous Apache Log4j Tool Under Active Attack
The Log4Shell vulnerability critically threatens anybody using the popular open-source Apache Struts framework and could lead to a βMini internet meltdown soonish.β
β βAppallingβ Riot Games Job Fraud Takes Aim at Wallets β
π Read
via "Threat Post".
Scammers are using fake job listings to empty the wallets of young, hopeful victims looking to break into the gaming industry.π Read
via "Threat Post".
Threat Post
βAppallingβ Riot Games Job Fraud Takes Aim at Wallets
Scammers are using fake job listings to empty the wallets of young, hopeful victims looking to break into the gaming industry.
βΌ CVE-2021-38917 βΌ
π Read
via "National Vulnerability Database".
IBM PowerVM Hypervisor FW860, FW940, and FW950 could allow an attacker that gains service access to the FSP can read and write arbitrary host system memory through a series of carefully crafted service procedures. IBM X-Force ID: 210018.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31745 βΌ
π Read
via "National Vulnerability Database".
Session Fixation vulnerability in login.php in Pluck-CMS Pluck 4.7.15 allows an attacker to sustain unauthorized access to the platform. Because Pluck does not invalidate prior sessions after a password change, access can be sustained even after an administrator performs regular remediation attempts such as resetting their password.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36911 βΌ
π Read
via "National Vulnerability Database".
Stored Cross-Site Scripting (XSS) vulnerability discovered in WordPress Comment Engine Pro plugin (versions <= 1.0), could be exploited by users with Editor or higher role.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37935 βΌ
π Read
via "National Vulnerability Database".
An information disclosure vulnerability in the login page of Huntflow Enterprise before 3.10.4 could allow an unauthenticated, remote user to get information about the domain name of the configured LDAP server. An attacker could exploit this vulnerability by requesting the login page and searching for the "isLdap" JavaScript parameter in the HTML source code.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38937 βΌ
π Read
via "National Vulnerability Database".
IBM PowerVM Hypervisor FW940, FW950, and FW1010 could allow an authenticated user to cause the system to crash using a specially crafted IBMi Hypervisor call. IBM X-Force ID: 210894.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37934 βΌ
π Read
via "National Vulnerability Database".
Due to insufficient server-side login-attempt limit enforcement, a vulnerability in /account/login in Huntflow Enterprise before 3.10.14 could allow an unauthenticated, remote user to perform multiple login attempts for brute-force password guessing.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43813 βΌ
π Read
via "National Vulnerability Database".
Grafana is an open-source platform for monitoring and observability. Grafana prior to versions 8.3.2 and 7.5.12 contains a directory traversal vulnerability for fully lowercase or fully uppercase .md files. The vulnerability is limited in scope, and only allows access to files with the extension .md to authenticated users only. Grafana Cloud instances have not been affected by the vulnerability. Users should upgrade to patched versions 8.3.2 or 7.5.12. For users who cannot upgrade, running a reverse proxy in front of Grafana that normalizes the PATH of the request will mitigate the vulnerability. The proxy will have to also be able to handle url encoded paths. Alternatively, for fully lowercase or fully uppercase .md files, users can block /api/plugins/.*/markdown/.* without losing any functionality beyond inlined plugin help text.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29214 βΌ
π Read
via "National Vulnerability Database".
A security vulnerability has been identified in HPE StoreServ Management Console (SSMC). An authenticated SSMC administrator could exploit the vulnerability to inject code and elevate their privilege in SSMC. The scope of this vulnerability is limited to SSMC. Note: The arrays being managed are not impacted by this vulnerability. This vulnerability impacts SSMC versions 3.4 GA to 3.8.1.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31746 βΌ
π Read
via "National Vulnerability Database".
Zip Slip vulnerability in Pluck-CMS Pluck 4.7.15 allows an attacker to upload specially crafted zip files, resulting in directory traversal and potentially arbitrary code execution.π Read
via "National Vulnerability Database".
β Next-Gen Maldocs & How to Solve the Human Vulnerability β
π Read
via "Threat Post".
Malicious email attachments with macros are one of the most common ways hackers get in through the door. Huntress security researcher John Hammond discusses how threat hunters can fight back.π Read
via "Threat Post".
Threat Post
Next-Gen Maldocs & How to Solve the Human Vulnerability
Malicious email attachments with macros are one of the most common ways hackers get in through the door. Huntress security researcher John Hammond discusses how threat hunters can fight back.
π¦Ώ Study: Most phishing pages are abandoned or disappear in a matter of days π¦Ώ
π Read
via "Tech Republic".
Research from Kaspersky finds that a quarter of phishing sites are gone within 13 hours β how in the world can we catch and stop cyber criminals that move so quickly?π Read
via "Tech Republic".
TechRepublic
Study: Most phishing pages are abandoned or disappear in a matter of days
Research from Kaspersky finds that a quarter of phishing sites are gone within 13 hours β how in the world can we catch and stop cyber criminals that move so quickly?
π¦Ώ Hackers reported 21% more vulnerabilities in 2021 than in 2020 π¦Ώ
π Read
via "Tech Republic".
HackerOne reports that hackers are reporting more bugs and earning bigger bounties, but is an increase in testing or an increase in software vulnerabilities the cause of the jump?π Read
via "Tech Republic".
TechRepublic
Hackers reported 21% more vulnerabilities in 2021 than in 2020
HackerOne reports that hackers are reporting more bugs and earning bigger bounties, but is an increase in testing or an increase in software vulnerabilities the cause of the jump?
βΌ CVE-2021-4089 βΌ
π Read
via "National Vulnerability Database".
snipe-it is vulnerable to Improper Access Controlπ Read
via "National Vulnerability Database".