πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  Wapiti Web Application Vulnerability Scanner 3.0.9 πŸ› 

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ SecurityScorecard Research Reveals Cyber Vulnerabilities Pose a Threat to U.S. Maritime Security πŸ•΄

While the shipping industry's cyber posture was better than companies in the Forbes Global 2000, the industry performed lower in key risk group factors.

πŸ“– Read

via "Dark Reading".
πŸ•΄ BlackBerry Launches New Managed Extended Detection and Response (XDR) Service πŸ•΄

Company partners with Exabeam to launch update to its BlackBerry Guard managed detection and response (MDR) service.

πŸ“– Read

via "Dark Reading".
πŸ•΄ SAIC Launches Rugged Apps to Provide Secure Commercial Apps to Government Users πŸ•΄

Rugged Apps ensures mobile apps are NIAP-compliant.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-44675 β€Ό

Zoho ManageEngine ServiceDesk Plus MSP before 10.5 Build 10534 is vulnerable to unauthenticated remote code execution due to a filter bypass in which authentication is not required.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44676 β€Ό

Zoho ManageEngine Access Manager Plus before 4203 allows anyone to view a few data elements (e.g., access control details) and modify a few aspects of the application state.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44525 β€Ό

Zoho ManageEngine PAM360 before build 5303 allows attackers to modify a few aspects of application state because of a filter bypass in which authentication is not required.

πŸ“– Read

via "National Vulnerability Database".
🦿 Synthetic identity fraud: What is it and why is it harmful? 🦿

Online consumers can do everything right and still become cyber victims. Learn about synthetic identity fraud and why "buyer beware" is not enough.

πŸ“– Read

via "Tech Republic".
πŸ” Banks Will Have 36 Hours to Disclose Cyber Incidents in 2022 πŸ”

Federal banking regulators recently issued a rule around reporting data incidents that’s scheduled to go into effect in April 2022.

πŸ“– Read

via "".
❌ Robocalls More Than Doubled in 2021, Cost Victims $30B ❌

T-Mobile reported blocking 21 billion scam calls during a record-smashing year for robocalls.

πŸ“– Read

via "Threat Post".
πŸ•΄ NetSPI Adds IoT Penetration Testing to its Suite of Offensive Security Services πŸ•΄

Led by IoT security expert Larry Trowell, the IoT pen-testing services focus on securing ATMs, automotive, medical devices, operational technology, and other embedded systems.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Brillio Acquires Cedrus Digital to Strengthen Their Digital Transformation Service Capabilities πŸ•΄

The acquisition of Cedrus Digital, with its consulting-led model and over 150 cloud, data and product engineers, primarily in the United States, will further augment Brillio’s nearshore digital transformation capabilities offered for Fortune 500 clients.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-43438 β€Ό

Stored XSS in Signup Form in iResturant 1.0 Allows Remote Attacker to Inject Arbitrary code via NAME and ADDRESS field

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43441 β€Ό

An HTML Injection Vulnerability in iOrder 1.0 allows the remote attacker to execute Malicious HTML codes via the signup form

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19316 β€Ό

OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43437 β€Ό

In sourcecodetester Engineers Online Portal as of 10-21-21, an attacker can manipulate the Host header as seen by the web application and cause the application to behave in unexpected ways. Very often multiple websites are hosted on the same IP address. This is where the Host Header comes in. This header specifies which website should process the HTTP request. The web server uses the value of this header to dispatch the request to the specified website. Each website hosted on the same IP address is called a virtual host. And It's possible to send requests with arbitrary Host Headers to the first virtual host.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43439 β€Ό

RCE in Add Review Function in iResturant 1.0 Allows remote attacker to execute commands remotely

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43440 β€Ό

Multiple Stored XSS Vulnerabilities in the Source Code of iOrder 1.0 allow remote attackers to execute arbitrary code via signup form in the Name and Phone number field.

πŸ“– Read

via "National Vulnerability Database".
❌ Conti Ransomware Gang Has Full Log4Shell Attack Chain ❌

Conti has become the first professional-grade, sophisticated ransomware group to weaponize Log4j2, now with a full attack chain.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-43844 β€Ό

MSEdgeRedirect is a tool to redirect news, search, widgets, weather, and more to a user's default browser. MSEdgeRedirect versions before 0.5.0.1 are vulnerable to Remote Code Execution via specifically crafted URLs. This vulnerability requires user interaction and the acceptance of a prompt. With how MSEdgeRedirect is coded, parameters are impossible to pass to any launched file. However, there are two possible scenarios in which an attacker can do more than a minor annoyance. In Scenario 1 (confirmed), a user visits an attacker controlled webpage; the user is prompted with, and downloads, an executable payload; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and RCE executes the payload the user previously downloaded, if the download path is successfully guessed. In Scenario 2 (not yet confirmed), a user visits an attacked controlled webpage; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and a payload on a remote, attacker controlled, SMB server is executed. The issue was found in the _DecodeAndRun() function, in which I incorrectly assumed _WinAPI_UrlIs() would only accept web resources. Unfortunately, file:/// passes the default _WinAPI_UrlIs check(). File paths are now directly checked for and must fail. There is no currently known exploitation of this vulnerability in the wild. A patched version, 0.5.0.1, has been released that checks for and denies these crafted URLs. There are no workarounds for this issue. Users are advised not to accept any unexpected prompts from web pages.

πŸ“– Read

via "National Vulnerability Database".