πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-45099 β€Ό

** DISPUTED ** The addon.stdin service in addon-ssh (aka Home Assistant Community Add-on: SSH & Web Terminal) before 10.0.0 has an attack surface that requires social engineering. NOTE: the vendor does not agree that this is a vulnerability; however, addon.stdin was removed as a defense-in-depth measure against complex social engineering situations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45088 β€Ό

XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an error page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45098 β€Ό

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45092 β€Ό

Thinfinity VirtualUI before 3.0 has functionality in /lab.html reachable by default that could allow IFRAME injection via the vpath parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45097 β€Ό

KNIME Server before 4.12.6 and 4.13.x before 4.13.4 (when installed in unattended mode) keeps the administrator's password in a file without appropriate file access controls, allowing all local users to read its content.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Rise in API-Based Attacks Underscore Investments in New Tools πŸ•΄

Noname Security's Series C fundraising tips the startup to over $1 billion in valuation, a sign that organizations are beginning to look for API security tools and investor are looking for innovation in the space.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-4121 β€Ό

yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4123 β€Ό

livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ How expired web domains help criminal hackers unlock enterprise defenses πŸ—“οΈ

Allow domains to β€˜drop’ and you’re increasing the effectiveness of a variety of attacks

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-40835 β€Ό

An URL Address bar spoofing vulnerability was discovered in Safe Browser for iOS. When user clicks on a specially crafted a malicious URL, if user does not carefully pay attention to url, user may be tricked to think content may be coming from a valid domain, while it comes from another. This is performed by using a very long username part of the url so that user cannot see the domain name. A remote attacker can leverage this to perform url address bar spoofing attack. The fix is, browser no longer shows the user name part in address bar.

πŸ“– Read

via "National Vulnerability Database".
❌ β€˜DarkWatchman’ RAT Shows Evolution in Fileless Malware ❌

The new tool manipulates Windows Registry in unique ways to evade security detections and is likely being used by ransomware groups for initial network access.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ UK government reveals plans to become β€˜global cyber power’ in 2022 πŸ—“οΈ

National Cyber Security Centre leads scheme to increase capabilities

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Dear Congress: It's Complicated. Please Consider This When Crafting New Cybersecurity Legislation πŸ•΄

As mandatory reporting bills work their way through the halls of Congress, what should businesses do to prepare for this pending legislation?

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-4124 β€Ό

janus-gateway is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
🦿 How to install the ConfigServer and Security Firewall combo on Ubuntu Server 🦿

If you'd like a powerful firewall for your Ubuntu Server, but one that offers a fairly straightforward configuration, Jack Wallen thinks CSF might be the right tool for the job.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ SAP squashes SQL injection, XSS bugs in December patch round πŸ—“οΈ

CVSS severity scores range from 2.4 to 9.9

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-3959 β€Ό

A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService component of Bitdefender Endpoint Security Tools allows an attacker to proxy requests to the relay server. This issue affects: Bitdefender Bitdefender GravityZone versions prior to 3.3.8.272

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3960 β€Ό

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects Bitdefender GravityZone versions prior to 3.3.8.272

πŸ“– Read

via "National Vulnerability Database".
⚠ Apple security updates are out – and not a Log4Shell mention in sight ⚠

Get 'em while they're hot!

πŸ“– Read

via "Naked Security".
β™ŸοΈ NY Man Pleads Guilty in $20 Million SIM Swap Theft β™ŸοΈ

A 24-year-old New York man who bragged about helping to steal more than $20 million worth of cryptocurrency from a technology executive has pleaded guilty to conspiracy to commit wire fraud. Nicholas Truglia was part of a group alleged to have stolen more than $100 million from cryptocurrency investors using fraudulent "SIM swaps," scams in which identity thieves hijack a target’s mobile phone number and use that to wrest control over the victim’s online identities.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Log4Shell: The Big Picture πŸ•΄

A look at why this is such a tricky vulnerability and why the industry response has been good, but not great.

πŸ“– Read

via "Dark Reading".