π΄ When Multifactor Authentication Is Compromised: Fighting Back With AI π΄
π Read
via "Dark Reading".
Now that attackers can bypass preventative controls, we need to find and stop the attackers when they're already inside.π Read
via "Dark Reading".
Dark Reading
When Multifactor Authentication Is Compromised: Fighting Back With AI
Now that attackers can bypass preventative controls, we need to find and stop the attackers when they're already inside.
π Massachusetts Latest State to Advance Data Privacy Bill π
π Read
via "".
The bill marks the first time that comprehensive data privacy legislation has advanced out of committee in Massachusetts.π Read
via "".
Digital Guardian
Massachusetts Latest State to Advance Data Privacy Bill
The bill marks the first time that comprehensive data privacy legislation has advanced out of committee in Massachusetts.
π΄ A Prophylactic Approach for Today's Vulnerable Websites and Web Apps π΄
π Read
via "Dark Reading".
Take a proactive approach to client-side security: Why monitoring your JavaScript programming language is so important to your overall security posture.π Read
via "Dark Reading".
Dark Reading
A Prophylactic Approach for Today's Vulnerable Websites and Web Apps
Take a proactive approach to client-side security: Why monitoring your JavaScript programming language is so important to your overall security posture.
βοΈ IRS To Ditch Biometric Requirement for Online Access βοΈ
π Read
via "Krebs on Security".
The Internal Revenue Service (IRS) said today it will be transitioning away from requiring biometric data from taxpayers who wish to access their records at the agency's website. The reversal comes as privacy experts and lawmakers have been pushing the IRS and other federal agencies to find less intrusive methods for validating one's identity with the U.S. government online.π Read
via "Krebs on Security".
Krebsonsecurity
IRS To Ditch Biometric Requirement for Online Access
The Internal Revenue Service (IRS) said today it will be transitioning away from requiring biometric data from taxpayers who wish to access their records at the agency's website. The reversal comes as privacy experts and lawmakers have been pushing theβ¦
βΌ CVE-2022-21814 βΌ
π Read
via "National Vulnerability Database".
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel driver package, where improper handling of insufficient permissions or privileges may allow an unprivileged local user limited write access to protected memory, which can lead to denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21813 βΌ
π Read
via "National Vulnerability Database".
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel driver, where improper handling of insufficient permissions or privileges may allow an unprivileged local user limited write access to protected memory, which can lead to denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21816 βΌ
π Read
via "National Vulnerability Database".
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where a user in the guest OS can cause a GPU interrupt storm on the hypervisor host, leading to a denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22931 βΌ
π Read
via "National Vulnerability Database".
Fix of CVE-2021-40525 do not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to user names being prefixed by the value of the username being used).π Read
via "National Vulnerability Database".
βΌ CVE-2022-21815 βΌ
π Read
via "National Vulnerability Database".
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for private IOCTLs where a NULL pointer dereference in the kernel, created within user mode code, may lead to a denial of service in the form of a system crash.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42833 βΌ
π Read
via "National Vulnerability Database".
A Use of Hardcoded Credentials vulnerability exists in AquaView versions 1.60, 7.x, and 8.x that could allow an authenticated local attacker to manipulate users and system settings.π Read
via "National Vulnerability Database".
β LockBit, BlackCat, Swissport, Oh My! Ransomware Activity Stays Strong β
π Read
via "Threat Post".
However, groups are rebranding and recalibrating their profiles and tactics to respond to law enforcement and the security community's focus on stopping ransomware attacks.π Read
via "Threat Post".
Threat Post
LockBit, BlackCat, Swissport, Oh My! Ransomware Activity Stays Strong
However, groups are rebranding and recalibrating their profiles and tactics to respond to law enforcement and the security community's focus on stopping ransomware attacks.
β Medusa Malware Joins Flubotβs Android Distribution Network β
π Read
via "Threat Post".
Two powerful trojans with spyware and RAT capabilities are being delivered in side-by-side campaigns using a common infrastructure.π Read
via "Threat Post".
Threat Post
Medusa Malware Joins Flubotβs Android Distribution Network
Two powerful trojans with spyware and RAT capabilities are being delivered in side-by-side campaigns using a common infrastructure.
β CISA Orders Federal Agencies to Fix Actively Exploited Windows Bug β
π Read
via "Threat Post".
Feb. 18 is the deadline to patch a bug that affects all unpatched versions of Windows 10 and requires zero user interaction to exploit.π Read
via "Threat Post".
Threat Post
CISA Orders Federal Agencies to Fix Actively Exploited Windows Bug
Feb. 18 is the deadline to patch a bug that affects all unpatched versions of Windows 10 and requires zero user interaction to exploit.
π΄ FBI Publishes Indicators of Compromise for LockBit 2.0 Ransomware π΄
π Read
via "Dark Reading".
Flash bulletin alert includes mitigation strategies for defending against the ransomware.π Read
via "Dark Reading".
Dark Reading
FBI Publishes Indicators of Compromise for LockBit 2.0 Ransomware
Flash bulletin alert includes mitigation strategies for defending against the ransomware.
βΌ CVE-2022-23613 βΌ
π Read
via "National Vulnerability Database".
xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21712 βΌ
π Read
via "National Vulnerability Database".
twisted is an event-driven networking engine written in Python. In affected versions twisted exposes cookies and authorization headers when following cross-origin redirects. This issue is present in the `twited.web.RedirectAgent` and `twisted.web. BrowserLikeRedirectAgent` functions. Users are advised to upgrade. There are no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45281 βΌ
π Read
via "National Vulnerability Database".
QuickBox Pro v2.4.8 contains a cross-site scripting (XSS) vulnerability at "adminuseredit.php?usertoedit=XSS", as the user supplied input for the value of this parameter is not properly sanitized.π Read
via "National Vulnerability Database".
βΌ CVE-2021-3861 βΌ
π Read
via "National Vulnerability Database".
The RNDIS USB device class includes a buffer overflow vulnerability. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvjπ Read
via "National Vulnerability Database".
βΌ CVE-2021-3835 βΌ
π Read
via "National Vulnerability Database".
Buffer overflow in usb device class. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jfπ Read
via "National Vulnerability Database".
π΄ Russian APT Steps Up Malicious Cyber Activity in Ukraine π΄
π Read
via "Dark Reading".
Actinium/Gameredon's attacks are another reminder of why organizations need to pay additional scrutiny to systems in the region.π Read
via "Dark Reading".
Dark Reading
Russian APT Steps Up Malicious Cyber Activity in Ukraine
Actinium/Gameredon's attacks are another reminder of why organizations need to pay additional scrutiny to systems in the region.
βΌ CVE-2022-23623 βΌ
π Read
via "National Vulnerability Database".
Frourio is a full stack framework, for TypeScript. Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder are subject to a input validation vulnerability. Validators do not work properly for request bodies and queries in specific situations and some input is not validated at all. Users are advised to update frourio to v0.26.0 or later and to install `class-transformer` and `reflect-metadata`.π Read
via "National Vulnerability Database".