πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-43827 β€Ό

discourse-footnote is a library providing footnotes for posts in Discourse. ### Impact When posting an inline footnote wrapped in `<a>` tags (e.g. `<a>^[footnote]</a>`, the resulting rendered HTML would include a nested `<a>`, which is stripped by Nokogiri because it is not valid. This then caused a javascript error on topic pages because we were looking for an `<a>` element inside the footnote reference span and getting its ID, and because it did not exist we got a null reference error in javascript. Users are advised to update to version 0.2. As a workaround editing offending posts from the rails console or the database console for self-hosters, or disabling the plugin in the admin panel can mitigate this issue.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cisco's Ash Devata on Securing the Hybrid Workforce With Zero Trust πŸ•΄

Hybrid work is here to stay, and organizations can apply zero trust's three core principles to ensure a secure workforce, Devata says.

πŸ“– Read

via "Dark Reading".
🦿 Log4j vulnerability: Why your hot take on it is wrong 🦿

Commentary: Those searching for a single cause for the Log4j vulnerability – whether it's open source is not secure, or open source is not sustainable – are getting it wrong. It's a complicated issue.

πŸ“– Read

via "Tech Republic".
❌ Apache’s Fix for Log4Shell Can Lead to DoS Attacks ❌

Not only is the jaw-dropping flaw in the Apache Log4j logging library ubiquitous; Apache’s blanket of a quickly baked patch for Log4Shell also has holes.

πŸ“– Read

via "Threat Post".
πŸ•΄ Kryptowire Collaborates With Orange and Finds Vulnerabilities in Mobile Devices πŸ•΄

Kryptowire’s end-to-end cybersecurity engine identified vulnerabilities granting system user-level privileges for arbitrary shell script execution.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-4116 β€Ό

yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20330 β€Ό

An attacker with basic CRUD permissions on a replicated collection can run the applyOps command with specially malformed oplog entries, resulting in a potential denial of service on secondaries. This issue affects MongoDB Server v4.0 versions prior to 4.0.25; MongoDB Server v4.2 versions prior to 4.2.14; MongoDB Server v4.4 versions prior to 4.4.6.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Why Cloud Storage Isn't Immune to Ransomware πŸ•΄

Cloud security is a shared responsibility. which sometimes leads to security gaps and complexity in risk management.

πŸ“– Read

via "Dark Reading".
πŸ›  OpenSSL Toolkit 1.1.1m πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

πŸ“– Read

via "Packet Storm Security".
πŸ—“οΈ US government launches β€˜Hack the DHS’ bug bounty program πŸ—“οΈ

Initiative will also invite selected security researchers to a live hacking event

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Why We Need "Developer-First" Application Security πŸ•΄

The way to improve the security of the modern software development life cycle and reduce the number of application-based breaches is to re-center app security around the needs of developers.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Log4j: Security pros call for urgent patch implementation as in-the-wild exploitation continues πŸ—“οΈ

Initial, β€˜incomplete’ patch created path to denial-of-service attacks

πŸ“– Read

via "The Daily Swig".
🦿 Kodachi is the operating system for those who value privacy but don't want to learn Linux 🦿

For anyone looking to gain an extra layer of privacy on a desktop or laptop, Kodachi Linux might be the perfect option. Jack Wallen highlights this live Linux distribution.

πŸ“– Read

via "Tech Republic".
🦿 Just in time for Christmas, Kronos payroll and HR cloud software goes offline due to ransomware 🦿

The attack has led to an outage expected to last weeks, leaving companies scrambling to make payroll with the holidays right around the corner.

πŸ“– Read

via "Tech Republic".
πŸ›  Log4j Recognizer πŸ› 

This utility looks for log4j in the currently running JVM. It is useful for systems that allow plugins to introduce their own jars. Therefore, you can find if someone is using log4j with a dangerous version.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2021-43237 β€Ό

Windows Setup Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43893 β€Ό

Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43227 β€Ό

Storage Spaces Controller Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-43235.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43877 β€Ό

ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43907 β€Ό

Visual Studio Code WSL Extension Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41333 β€Ό

Windows Print Spooler Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".