β That Toy You Got for Christmas Could Be Spying on You β
π Read
via "Threat Post".
Security flaws in the recently released Fisher-Price Chatter Bluetooth telephone can allow nearby attackers to spy on calls or communicate with children using the device.π Read
via "Threat Post".
Threat Post
That Toy You Got for Christmas Could Be Spying on You
Security flaws in the recently released Fisher-Price Chatter Bluetooth telephone can allow nearby attackers to spy on calls or communicate with children using the device.
π¦Ώ Check for Log4j vulnerabilities with this simple-to-use script π¦Ώ
π Read
via "Tech Republic".
If you're not certain whether your Java project is free from Log4j vulnerabilities, you should try this easy-to-use scanning tool immediately.π Read
via "Tech Republic".
TechRepublic
Check for Log4j vulnerabilities with this simple-to-use script
If you're not certain whether your Java project is free from Log4j vulnerabilities, you should try this easy-to-use scanning tool immediately.
βΌ CVE-2021-45814 βΌ
π Read
via "National Vulnerability Database".
Nettmp NNT 5.1 is affected by a SQL injection vulnerability. An attacker can bypass authentication and access the panel with an administrative account.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45812 βΌ
π Read
via "National Vulnerability Database".
NUUO Network Video Recorder NVRsolo 3.9.1 is affected by a Cross Site Scripting (XSS) vulnerability. An attacker can steal the user's session by injecting malicious JavaScript codes which leads to session hijacking.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45813 βΌ
π Read
via "National Vulnerability Database".
SLICAN WebCTI 1.01 2015 is affected by a Cross Site Scripting (XSS) vulnerability. The attacker can steal the user's session by injecting malicious JavaScript codes which leads to Session Hijacking and cause user's credentials theft.π Read
via "National Vulnerability Database".
π΄ AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions π΄
π Read
via "Dark Reading".
The Business Security Test is a comprehensive investigation of corporate endpoint security solutions on the market.π Read
via "Dark Reading".
Dark Reading
AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions
The Business Security Test is a comprehensive investigation of corporate endpoint security solutions on the market.
π΄ After Google's Landmark Settlement, How Ad Networks Should Tackle Child Privacy π΄
π Read
via "Dark Reading".
To comply with the updated COPPA Rule, online ad platforms need to change how they handle viewers who might be children.π Read
via "Dark Reading".
Dark Reading
After Google's Landmark Settlement, How Ad Networks Should Tackle Child Privacy
To comply with the updated COPPA Rule, online ad platforms need to change how they handle viewers who might be children.
π΄ The Log4j Flaw Will Take Years to be Fully Addressed π΄
π Read
via "Dark Reading".
Over 80% of Java packages stored on Maven Central Repository have log4j as an indirect dependency, with most of them burying the vulnerable version five levels deep, says Google's Open Source Insights Team.π Read
via "Dark Reading".
Dark Reading
The Log4j Flaw Will Take Years to Be Fully Addressed
Over 80% of Java packages stored on Maven Central Repository have Log4j as an indirect dependency, with most of them burying the vulnerable version five levels deep, says Google's Open Source Insights Team.
βΌ CVE-2021-25990 βΌ
π Read
via "National Vulnerability Database".
In Γ’β¬ΕifmeΓ’β¬οΏ½, versions v7.22.0 to v7.31.4 are vulnerable against self-stored XSS in the contacts field as it allows loading XSS payloads fetched via an iframe.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44161 βΌ
π Read
via "National Vulnerability Database".
Changing MOTP (Mobile One Time Password) systemΓ’β¬β’s specific function parameter has insufficient validation for user input. A attacker in local area network can perform SQL injection attack to read, modify or delete backend database without authentication.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25989 βΌ
π Read
via "National Vulnerability Database".
In Γ’β¬ΕifmeΓ’β¬οΏ½, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability in the markdown editor. It can be exploited by making a victim a Leader of a group which triggers the payload for them.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44160 βΌ
π Read
via "National Vulnerability Database".
Carinal Tien Hospital Health Report SystemΓ’β¬β’s login page has improper authentication, a remote attacker can acquire another general userΓ’β¬β’s privilege by modifying the cookie parameter without authentication. The attacker can then perform limited operations on the system or modify data, making the service partially unavailable to the user.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25991 βΌ
π Read
via "National Vulnerability Database".
In Ifme, versions v5.0.0 to v7.32 are vulnerable against an improper access control, which makes it possible for admins to self-ban themself leading to their deactivation from Ifme account and complete loss of admin access in Ifme.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25988 βΌ
π Read
via "National Vulnerability Database".
In Γ’β¬ΕifmeΓ’β¬οΏ½, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability (notifications section) which can be directly triggered by sending an ally request to the admin.π Read
via "National Vulnerability Database".
ποΈ Indian authorities set to tighten data breach laws in 2022 ποΈ
π Read
via "The Daily Swig".
Credit card storage rules and 72-hour breach notification deadline due to come into play next yearπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Indian authorities set to tighten data breach laws in 2022
Credit card storage rules and 72-hour breach notification deadline due to come into play next year
β Cryptomining Attack Exploits Docker API Misconfiguration Since 2019 β
π Read
via "Threat Post".
Campaign exploits misconfigured Docker APIs to gain network entry and ultimately sets up a backdoor on compromised hosts to mine cryptocurrency.π Read
via "Threat Post".
Threat Post
Cryptomining Attack Exploits Docker API Misconfiguration Since 2019
Campaign exploits misconfigured Docker APIs to gain network entry and ultimately sets up a backdoor on compromised hosts to mine cryptocurrency.
β 5 Cybersecurity Trends to Watch in 2022 β
π Read
via "Threat Post".
Hereβs what cybersecurity watchers want infosec pros to know heading into 2022. π Read
via "Threat Post".
Threat Post
5 Cybersecurity Trends to Watch in 2022
Hereβs what cybersecurity watchers want infosec pros to know heading into 2022.
ποΈ LastPass quells cyber-attack fears, blames email notification surge on βglitchβ ποΈ
π Read
via "The Daily Swig".
Password vault investigation reveals no evidence of credential stuffing activityπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
LastPass quells cyber-attack fears, blames email notification surge on βglitchβ
Password vault investigation reveals no evidence of credential stuffing activity
β SFW! The Top N CyberΒsecurity Stories of 2021 (for small positive integer values of N) β
π Read
via "Naked Security".
Happy Holidays! Our Top N stories, all totally SFW!π Read
via "Naked Security".
Naked Security
SFW! The Top N CyberΒsecurity Stories of 2021 (for small positive integer values of N)
Happy Holidays! Our Top N stories, all totally SFW!
βΌ CVE-2021-38680 βΌ
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Kazoo Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Kazoo Server: Kazoo Server 4.11.20 and laterπ Read
via "National Vulnerability Database".
βΌ CVE-2021-38687 βΌ
π Read
via "National Vulnerability Database".
A stack buffer overflow vulnerability has been reported to affect QNAP NAS running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of Surveillance Station: QTS 5.0.0 (64 bit): Surveillance Station 5.2.0.4.2 ( 2021/10/26 ) and later QTS 5.0.0 (32 bit): Surveillance Station 5.2.0.3.2 ( 2021/10/26 ) and later QTS 4.3.6 (64 bit): Surveillance Station 5.1.5.4.6 ( 2021/10/26 ) and later QTS 4.3.6 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later QTS 4.3.3: Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and laterπ Read
via "National Vulnerability Database".