πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-22111 β€Ό

In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administratorÒ€ℒs. This allows the attacker to gain access to the highest privileged user in the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22109 β€Ό

In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victimÒ€ℒs browser when they open the Ò€œ/tasksҀ� page to view all the tasks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22107 β€Ό

In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the appointments of all users in the system including administrators. However, this type of user is not authorized to view the calendar at all.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Why We Need To Reframe the False-Positive Problem πŸ•΄

Efforts to tune or build behavior- or signature-based threat identification requires time and effort most organizations don't have.

πŸ“– Read

via "Dark Reading".
🦿 Behind the scenes: A day in the life of a cybersecurity curriculum director 🦿

The Kennedy Space Center kick-started Andee Harston's career in cybersecurity. Here's how she worked her way up to overseeing the cybersecurity curriculum for Infosec.

πŸ“– Read

via "Tech Republic".
🦿 MalSmoke attack: Zloader malware exploits Microsoft's signature verification to steal sensitive data 🦿

Already impacting more than 2,000 victims, the malware is able to modify a DLL file digitally signed by Microsoft, says Check Point Research.

πŸ“– Read

via "Tech Republic".
❌ FTC to Go After Companies that Ignore Log4j ❌

Companies that fail to protect secure consumer data from Log4J attacks are at risk of facing Equifax-esque legal action and fines, the FTC warned.

πŸ“– Read

via "Threat Post".
πŸ•΄ Which Cloud Strategy Is Right For My Organization's Security Needs? πŸ•΄

The massive Amazon Web Services outage in December had many security leaders asking whether they should be going multicloud or multiregion for their cloud environments.

πŸ“– Read

via "Dark Reading".
πŸ•΄ FTC: Companies Could Face Legal Action for Failing to Patch Log4j πŸ•΄

The FTC will pursue companies that fail to take steps to protect consumer data from exposure due to Log4j, officials report.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-28712 β€Ό

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38918 β€Ό

IBM PowerVM Hypervisor FW860, FW940, FW950, and FW1010, through a specific sequence of VM management operations could lead to a violation of the isolation between peer VMs. IBM X-Force ID: 210019.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28711 β€Ό

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28713 β€Ό

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713

πŸ“– Read

via "National Vulnerability Database".
πŸ” Top Tips for Preventing BEC Scams πŸ”

Business email compromise scams have cost companies billions over the past several years. How can businesses best protect themselves against a BEC scam? We asked a panel of experts.

πŸ“– Read

via "".
❌ Uber Bug, Ignored for Years, Casts Doubt on Official Uber Emails ❌

A simple-to-exploit bug that allows bad actors to send emails from Uber's official system -- skating past email security -- went unaddressed despite multiple flagging by researchers.

πŸ“– Read

via "Threat Post".
πŸ•΄ NY AG: 1.1M Online Consumer Accounts Found Compromised in Credential-Stuffing Attacks πŸ•΄

Stolen credentials tied to cyberattack incidents at 17 "well-known" online retailers, restaurant chains, food delivery services.

πŸ“– Read

via "Dark Reading".
❌ Broward Breach Highlights Healthcare Supply-Chain Problems ❌

More than 1.3 million patient records were stolen in the just-disclosed breach, which occurred back in October.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-21652 β€Ό

Shopware is an open source e-commerce software platform. In affected versions shopware would not invalidate a user session in the event of a password change. With version 5.7.7 the session validation was adjusted, so that sessions created prior to the latest password change of a customer account can't be used to login with said account. This also means, that upon a password change, all existing sessions for a given customer account are automatically considered invalid. There is no workaround for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21642 β€Ό

Discourse is an open source platform for community discussion. In affected versions when composing a message from topic the composer user suggestions reveals whisper participants. The issue has been patched in stable version 2.7.13 and beta version 2.8.0.beta11. There is no workaround for this issue and users are advised to upgrade.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45831 β€Ό

A Null Pointer Dereference vulnerability exitgs in GPAC 1.0.1 in MP4Box via __strlen_avx2, which causes a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45830 β€Ό

A heap-based buffer overflow vulnerability exists in HDF5 1.13.1-1 via H5F_addr_decode_len in /hdf5/src/H5Fint.c, which could cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".