πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-30353 β€Ό

Improper validation of function pointer type with actual function signature can lead to assertion in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Check If You Have to Worry About the Latest HTTP Protocol Stack Flaw πŸ•΄

In this Tech Tip, SANS Institute’s Johannes Ullrich suggests using PowerShell to identify Windows systems affected by the newly disclosed vulnerability in http.sys.

πŸ“– Read

via "Dark Reading".
❌ Adobe Cloud Abused to Steal Office 365, Gmail Credentials ❌

Threat actors are creating accounts within the Adobe Cloud suite and sending images and PDFs that appear legitimate to target Office 365 and Gmail users, researchers from Avanan discovered.

πŸ“– Read

via "Threat Post".
πŸ•΄ Microsoft RDP Bug Enables Data Theft, Smart-Card Hijacking πŸ•΄

The vulnerability was patched this week in Microsoft's set of security updates for January 2022.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Generation cyber: How diversity and ageism can impact the IT workforce πŸ—“οΈ

Report claims generational attitudes can help or hinder the industry

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-23514 β€Ό

This affects the package Crow before 0.3+4. It is possible to traverse directories to fetch arbitrary files from the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45806 β€Ό

jpress v4.2.0 admin panel provides a function through which attackers can modify the template and inject some malicious code.

πŸ“– Read

via "National Vulnerability Database".
❌ New GootLoader Campaign Targets Accounting, Law Firms ❌

GootLoader hijacks WordPress sites to lure professionals to download malicious sample contract templates.

πŸ“– Read

via "Threat Post".
⚠ S3 Ep65: Supply chain conniption, NetUSB hole, Honda flashback, FTC muscle [Podcast + Transcript] ⚠

Latest episode -listen to it or read it now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Redefining the CISO-CIO Relationship πŸ•΄

While these roles have different needs, drivers, and objectives, they should complement each other rather than compete with one another.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ GitLab shifts left to patch high-impact vulnerabilities πŸ—“οΈ

HackerOne bug bounty reports triaged

πŸ“– Read

via "The Daily Swig".
πŸ›  Clam AntiVirus Toolkit 0.104.2 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2021-23824 β€Ό

This affects the package Crow before 0.3+4. When using attributes without quotes in the template, an attacker can manipulate the input to introduce additional attributes, potentially executing code. This may lead to a Cross-site Scripting (XSS) vulnerability, assuming an attacker can influence the value entered into the template. If the template is used to render user-generated content, this vulnerability may escalate to a persistent XSS vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23131 β€Ό

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23132 β€Ό

During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23133 β€Ό

An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40327 β€Ό

Trusted Firmware-M (TF-M) 1.4.0, when Profile Small is used, has incorrect access control. NSPE can access a secure key (held by the Crypto service) based solely on knowledge of its key ID. For example, there is no authorization check associated with the relationship between a caller and a key owner.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23134 β€Ό

After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.

πŸ“– Read

via "National Vulnerability Database".
🦿 New study reveals phishing simulations might not be effective in training users 🦿

A new study at unprecedented scale revealed that embedded phishing training in simulations run by organizations doesn't work well. Yet crowd-sourcing phishing detection is.

πŸ“– Read

via "Tech Republic".
❌ US Military Ties Prolific MuddyWater Cyberespionage APT to Iran ❌

US Cyber Command linked the group to Iranian intelligence and detailed its multi-pronged, increasingly sophisticated suite of malware tools.

πŸ“– Read

via "Threat Post".
πŸ•΄ How Cybercriminals Are Cashing in on the Culture of 'Yes' πŸ•΄

The reward is always front of mind, while the potential harm of giving out a phone number doesn't immediately reveal itself.

πŸ“– Read

via "Dark Reading".