πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 The rise of the CISO: The escalation in cyberattacks makes this role increasingly important 🦿

As the digital landscape has grown, the organizational need for cybersecurity and data protection has risen. A new study takes a look at where CISOs stand in businesses.

πŸ“– Read

via "Tech Republic".
⚠ JavaScript developer destroys own projects in supply chain β€œlesson” ⚠

Two popular open source JavaScript packages recently got "hacked" in a smbolic gesture by the original project creator.

πŸ“– Read

via "Naked Security".
⚠ Honda cars in flashback to 2002 β€“ β€œCan’t Get You Out Of My Head” ⚠

Where were YOU on the night of 17 May 2002? And what about the day after that?

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-0144 β€Ό

shelljs is vulnerable to Improper Privilege Management

πŸ“– Read

via "National Vulnerability Database".
❌ Millions of Routers Exposed to RCE by USB Kernel Bug ❌

The high-severity RCE flaw is in the KCodes NetUSB kernel module, used by popular routers from Netgear, TP-Link, DLink, Western Digital, et al.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ IP spoofing bug leaves Django REST applications open to DDoS, password-cracking attacks πŸ—“οΈ

Security researcher discovers how to send unlimited HTTP requests with the same client

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-37195 β€Ό

A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45460 β€Ό

A vulnerability has been identified in SICAM PQ Analyzer (All versions < V3.18). A service is started by an unquoted registry entry. As there are spaces in this path, attackers with write privilege to those directories might be able to plant executables that will run in place of the legitimate process. Attackers might achieve persistence on the system ("backdoors") or cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41769 β€Ό

A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MU85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7KE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SA86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ81 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SK82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SK85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SL86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SS85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7ST85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SX85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UM85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7UT85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VK87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 Compact 7SX800 devices (CPU variant CP050) (All versions < V8.83). An improper input validation vulnerability in the web server could allow an unauthenticated user to access device information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37197 β€Ό

A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS is vulnerable to SQL injections. This could allow an attacker to execute arbitrary SQL statements.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37196 β€Ό

A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS unpacks specially crafted archive files to relative paths. This vulnerability could allow an attacker to store files in any folder accessible by the COMOS Web webservice.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45034 β€Ό

A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions < V16.20), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions < V16.20), CP-8021 MASTER MODULE (All versions < V16.20), CP-8022 MASTER MODULE WITH GPRS (All versions < V16.20). The web server of the affected system allows access to logfiles and diagnostic data generated by a privileged user. An unauthenticated attacker could access the files by knowing the corresponding download links.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45033 β€Ό

A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions < V16.20), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions < V16.20), CP-8021 MASTER MODULE (All versions < V16.20), CP-8022 MASTER MODULE WITH GPRS (All versions < V16.20). An undocumented debug port uses hard-coded default credentials. If this port is enabled by a privileged user, an attacker aware of the credentials could access an administrative debug shell on the affected device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37198 β€Ό

A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS uses a flawed implementation of CSRF prevention. An attacker could exploit this vulnerability to perform Cross-Site-Request-Forgery attacks.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Multiple Node.js vulnerabilities fixed in flurry of new releases πŸ—“οΈ

Three medium-impact and one low severity bug have been patched

πŸ“– Read

via "The Daily Swig".
πŸ•΄ 5 Things to Know About Next-Generation SIEM πŸ•΄

NG-SIEM is emerging as a cloud- and analytics-driven alternative to legacy SIEMs. Based on new research, Omdia highlights five important new insights for anyone considering a NG-SIEM purchase.

πŸ“– Read

via "Dark Reading".
❌ Critical SonicWall NAC Vulnerability Stems from Apache Mods ❌

Researchers offer more detail on the bug, which can allow attackers to completely take over targets.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-44647 β€Ό

Lua 5.4.4 and 5.4.2 are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local denial of service.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Why Security Awareness Training Should Begin in the C-Suite πŸ•΄

It's not just the rights and privileges that CXOs have on the network. They can also set an example of what good security hygiene looks like.

πŸ“– Read

via "Dark Reading".
❌ β€˜Fully Undetected’ SysJoker Backdoor Malware Targets Windows, Linux & macOS ❌

The malware establishes initial access on targeted machines, then waits for additional code to execute.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ VMware Horizon under attack as China-based ransomware group targets Log4j vulnerability πŸ—“οΈ

Microsoft says cybercrime group is attempting to deploy NightSky ransomware

πŸ“– Read

via "The Daily Swig".