β Spyware Blitzes Compromise, Cannibalize ICS Networks β
π Read
via "Threat Post".
The brief spearphishing campaigns spread malware and use compromised networks to steal credentials that can be sold or used to commit financial fraud.π Read
via "Threat Post".
Threat Post
Spyware Blitzes Compromise, Cannibalize ICS Networks
The brief spearphishing campaigns spread malware and use compromised networks to steal credentials that can be sold or used to commit financial fraud.
π΄ Looking Beyond Biden's Binding Security Directive π΄
π Read
via "Dark Reading".
Implementing these and other security procedures will greatly improve the security posture of the United States and its private partners.π Read
via "Dark Reading".
Dark Reading
Looking Beyond Biden's Binding Security Directive
Implementing these and other security procedures will greatly improve the security posture of the United States and its private partners.
βΌ CVE-2022-0319 βΌ
π Read
via "National Vulnerability Database".
Out-of-bounds Read in Conda vim prior to 8.2.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19858 βΌ
π Read
via "National Vulnerability Database".
Platinum Upnp SDK through 1.2.0 has a directory traversal vulnerability. The attack could remote attack victim by sending http://ip:port/../privacy.avi URL to compromise a victim's privacy.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19860 βΌ
π Read
via "National Vulnerability Database".
When ldns version 1.7.1 verifies a zone file, the ldns_rr_new_frm_str_internal function has a heap out of bounds read vulnerability. An attacker can leak information on the heap by constructing a zone file payload.π Read
via "National Vulnerability Database".
ποΈ Was COMELEC hacked? Philippines Commission on Elections casts doubt on data breach claims ποΈ
π Read
via "The Daily Swig".
Local newspaper alleges that usernames and PINs of vote-counting machines were stolenπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Was COMELEC hacked? Philippines Commission on Elections casts doubt on data breach claims
Local newspaper alleges that usernames and PINs of vote-counting machines were stolen
β S3 Ep66: Cybercrime busts, wormable Windows, and the crisis of featuritis [Podcast + Transcript] β
π Read
via "Naked Security".
Latest epsiode - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep66: Cybercrime busts, wormable Windows, and the crisis of featuritis [Podcast + Transcript]
Latest epsiode β listen now!
ποΈ European Commission launches new open source software bug bounty program ποΈ
π Read
via "The Daily Swig".
Hackers are invited to test services used by EU agenciesπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
European Commission launches new open source software bug bounty program
Hackers are invited to test services used by EU agencies
β Cryptocoin broker Crypto.com says 2FA bypass led to $35m theft β
π Read
via "Naked Security".
The company has put out a brief security report that summarises the 'what', but not yet the 'how' or 'why'.π Read
via "Naked Security".
Naked Security
Cryptocoin broker Crypto.com says 2FA bypass led to $35m theft
The company has put out a brief security report that summarises the βwhatβ, but not yet the βhowβ or βwhyβ.
βΌ CVE-2021-46201 βΌ
π Read
via "National Vulnerability Database".
An SQL Injection vulnerability exists in Sourcecodester Online Resort Management System 1.0 via the id parameterv in /orms/ node.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40855 βΌ
π Read
via "National Vulnerability Database".
The EU Technical Specifications for Digital COVID Certificates before 1.1 mishandle certificate governance. A non-production public key certificate could have been used in production.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46200 βΌ
π Read
via "National Vulnerability Database".
An SQL Injection vulnerability exists in Sourcecodester Simple Music Clour Community System 1.0 via the email parameter in /music/ajax.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46307 βΌ
π Read
via "National Vulnerability Database".
An SQL Injection vulnerability exists in Projectworlds Online Examination System 1.0 via the eid parameter in account.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-35003 βΌ
π Read
via "National Vulnerability Database".
This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer C90 1.0.6 Build 20200114 rel.73164(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14655.π Read
via "National Vulnerability Database".
βΌ CVE-2021-35004 βΌ
π Read
via "National Vulnerability Database".
This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link TL-WA1201 1.0.1 Build 20200709 rel.66244(5553) wireless access points. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14656.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46198 βΌ
π Read
via "National Vulnerability Database".
An SQL Injection vulnerability exists in Sourceodester Courier Management System 1.0 via the email parameter in /cms/ajax.php app.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19861 βΌ
π Read
via "National Vulnerability Database".
When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23220 βΌ
π Read
via "National Vulnerability Database".
USBView 2.1 before 2.2 allows some local users (e.g., ones logged in via SSH) to execute arbitrary code as root because certain Polkit settings (e.g., allow_any=yes) for pkexec disable the authentication requirement. Code execution can, for example, use the --gtk-module option. This affects Ubuntu, Debian, and Gentoo.π Read
via "National Vulnerability Database".
βοΈ Crime Shop Sells Hacked Logins to Other Crime Shops βοΈ
π Read
via "Krebs on Security".
Up for the "Most Meta Cybercrime Offering" award this year is Accountz Club, a new cybercrime store that sells access to purloined accounts at services built for cybercriminals, including shops peddling stolen payment cards and identities, spamming tools, email and phone bombing services, and those selling authentication cookies for a slew of popular websites.π Read
via "Krebs on Security".
Krebs on Security
Crime Shop Sells Hacked Logins to Other Crime Shops
Up for the "Most Meta Cybercrime Offering" award this year is Accountz Club, a new cybercrime store that sells access to purloined accounts at services built for cybercriminals, including shops peddling stolen payment cards and identities, spamming toolsβ¦
β McAfee Bug Can Be Exploited to Gain Windows SYSTEM Privileges β
π Read
via "Threat Post".
McAfee has patched two high-severity bugs in its Agent component, one of which can allow attackers to achieve arbitrary code execution with SYSTEM privileges.π Read
via "Threat Post".
Threat Post
McAfee Bug Can Be Exploited to Gain Windows SYSTEM Privileges
McAfee has patched two high-severity bugs in its Agent component, one of which can allow attackers to achieve arbitrary code execution with SYSTEM privileges.
β 20K WordPress Sites Exposed by Insecure Plugin REST-API β
π Read
via "Threat Post".
The WordPress WP HTML Mail plugin for personalized emails is vulnerable to code injection and phishing due to XSS.π Read
via "Threat Post".
Threat Post
20K WordPress Sites Exposed by Insecure Plugin REST-API
The WordPress WP HTML Mail plugin for personalized emails is vulnerable to code injection and phishing due to XSS.