ποΈ Indian authorities set to tighten data breach laws in 2022 ποΈ
π Read
via "The Daily Swig".
Credit card storage rules and 72-hour breach notification deadline due to come into play next yearπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Indian authorities set to tighten data breach laws in 2022
Credit card storage rules and 72-hour breach notification deadline due to come into play next year
β Cryptomining Attack Exploits Docker API Misconfiguration Since 2019 β
π Read
via "Threat Post".
Campaign exploits misconfigured Docker APIs to gain network entry and ultimately sets up a backdoor on compromised hosts to mine cryptocurrency.π Read
via "Threat Post".
Threat Post
Cryptomining Attack Exploits Docker API Misconfiguration Since 2019
Campaign exploits misconfigured Docker APIs to gain network entry and ultimately sets up a backdoor on compromised hosts to mine cryptocurrency.
β 5 Cybersecurity Trends to Watch in 2022 β
π Read
via "Threat Post".
Hereβs what cybersecurity watchers want infosec pros to know heading into 2022. π Read
via "Threat Post".
Threat Post
5 Cybersecurity Trends to Watch in 2022
Hereβs what cybersecurity watchers want infosec pros to know heading into 2022.
ποΈ LastPass quells cyber-attack fears, blames email notification surge on βglitchβ ποΈ
π Read
via "The Daily Swig".
Password vault investigation reveals no evidence of credential stuffing activityπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
LastPass quells cyber-attack fears, blames email notification surge on βglitchβ
Password vault investigation reveals no evidence of credential stuffing activity
β SFW! The Top N CyberΒsecurity Stories of 2021 (for small positive integer values of N) β
π Read
via "Naked Security".
Happy Holidays! Our Top N stories, all totally SFW!π Read
via "Naked Security".
Naked Security
SFW! The Top N CyberΒsecurity Stories of 2021 (for small positive integer values of N)
Happy Holidays! Our Top N stories, all totally SFW!
βΌ CVE-2021-38680 βΌ
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Kazoo Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Kazoo Server: Kazoo Server 4.11.20 and laterπ Read
via "National Vulnerability Database".
βΌ CVE-2021-38687 βΌ
π Read
via "National Vulnerability Database".
A stack buffer overflow vulnerability has been reported to affect QNAP NAS running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of Surveillance Station: QTS 5.0.0 (64 bit): Surveillance Station 5.2.0.4.2 ( 2021/10/26 ) and later QTS 5.0.0 (32 bit): Surveillance Station 5.2.0.3.2 ( 2021/10/26 ) and later QTS 4.3.6 (64 bit): Surveillance Station 5.1.5.4.6 ( 2021/10/26 ) and later QTS 4.3.6 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later QTS 4.3.3: Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and laterπ Read
via "National Vulnerability Database".
βΌ CVE-2021-35035 βΌ
π Read
via "National Vulnerability Database".
A cleartext storage of sensitive information vulnerability in the Zyxel NBG6604 firmware could allow a remote, authenticated attacker to obtain sensitive information from the configuration file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-35034 βΌ
π Read
via "National Vulnerability Database".
An insufficient session expiration vulnerability in the CGI program of the Zyxel NBG6604 firmware could allow a remote attacker to access the device if the correct token can be intercepted.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38688 βΌ
π Read
via "National Vulnerability Database".
An improper authentication vulnerability has been reported to affect Android App Qfile. If exploited, this vulnerability allows attackers to compromise app and access information We have already fixed this vulnerability in the following versions of Qfile: Qfile 3.0.0.1105 and laterπ Read
via "National Vulnerability Database".
π΄ Why Cyber Due Diligence Is Essential to the M&A Process π΄
π Read
via "Dark Reading".
That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold off.π Read
via "Dark Reading".
Dark Reading
Why Cyber Due Diligence Is Essential to the M&A Process
That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold off.
β Log4Shell vulnerability Number Four: βMuch ado about somethingβ β
π Read
via "Naked Security".
It's a Log4j bug, and you ought to patch it. But we don't think it's a critical crisis like the last one.π Read
via "Naked Security".
Naked Security
Log4Shell vulnerability Number Four: βMuch ado about somethingβ
Itβs a Log4j bug, and you ought to patch it. But we donβt think itβs a critical crisis like the last one.
ποΈ Swig Security Review 2021 β Part I ποΈ
π Read
via "The Daily Swig".
Key thinkers on the biggest security stories and trends in 2021π Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Swig Security Review 2021 β Part I
Key thinkers on the biggest security stories and trends in 2021
βΌ CVE-2021-36723 βΌ
π Read
via "National Vulnerability Database".
Emuse - eServices / eNvoice Exposure Of Private Personal Information due to lack of identification mechanisms and predictable IDs an attacker can scrape all the files on the service.π Read
via "National Vulnerability Database".
βΌ CVE-2021-4176 βΌ
π Read
via "National Vulnerability Database".
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')π Read
via "National Vulnerability Database".
βΌ CVE-2021-36722 βΌ
π Read
via "National Vulnerability Database".
Emuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host.π Read
via "National Vulnerability Database".
βΌ CVE-2021-4175 βΌ
π Read
via "National Vulnerability Database".
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')π Read
via "National Vulnerability Database".
β Threat Advisory: E-commerce Bots Use Domain Registration Services for Mass (Fake) Account Creation β
π Read
via "Threat Post".
Jason Kent is Hacker-in-Residence at Cequence Security.π Read
via "Threat Post".
Threat Post
Threat Advisory: E-commerce Bots Use Domain Registration Services for Mass Account Fraud
Jason Kent, hacker-in-residence at Cequence Security, discusses sneaky shopping bot tactics (i.e., domain parking) seen in a mass campaign, and what retail security teams can do about them.
βΌ CVE-2021-45885 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Stormshield Network Security (SNS) 4.2.2 through 4.2.7 (fixed in 4.2.8). Under a specific update-migration scenario, the first SSH password change does not properly clear the old password.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25993 βΌ
π Read
via "National Vulnerability Database".
In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected by Stored XSS vulnerability, where a low privileged (editor) user can upload a SVG file that contains malicious JavaScript while uploading assets in the page. That will send the JWT tokens to the attackerΓ’β¬β’s server and will lead to account takeover when accessed by the victim.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23727 βΌ
π Read
via "National Vulnerability Database".
This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.π Read
via "National Vulnerability Database".