πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-22813 β€Ό

A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20032 β€Ό

In vow driver, there is a possible memory corruption due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05852822; Issue ID: ALPS05852822.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22807 β€Ό

A CWE-1021 Improper Restriction of Rendered UI Layers or Frames vulnerability exists that could cause unintended modifications of the product settings or user accounts when deceiving the user to use the web interface rendered within iframes. Affected Product: EcoStruxure EV Charging Expert (formerly known as EVlink Load Management System): (HMIBSCEA53D1EDB, HMIBSCEA53D1EDS, HMIBSCEA53D1EDM, HMIBSCEA53D1EDL, HMIBSCEA53D1ESS, HMIBSCEA53D1ESM, HMIBSCEA53D1EML) (All Versions prior to SP8 (Version 01) V4.0.0.13)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20037 β€Ό

In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171705; Issue ID: ALPS06171705.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0115 β€Ό

Buffer overflow in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep69: WordPress woes, Wormhole holes, and a Microsoft change of heart [Podcast + Transcript] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
β™ŸοΈ Russian Govt. Continues Carding Shop Crackdown β™ŸοΈ

Russian authorities have arrested six men accused of operating some of the most active online bazaars for selling stolen payment card data. The crackdown -- the second closure of major card fraud shops by Russian authorities in as many weeks -- comes closely behind Russia's arrest of 14 alleged affiliates of the REvil ransomware gang, and has many in the cybercrime underground asking who might be next.

πŸ“– Read

via "Krebs on Security".
❌ PHP Everywhere Bugs Put 30K+ WordPress Sites at Risk of RCE ❌

The plug-in’s default settings spawned flaws that could allow for full site takeover but have since been fixed in an update that users should immediately install, Wordfence researchers said.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-45901 β€Ό

The password-reset form in ServiceNow Orlando provides different responses to invalid authentication attempts depending on whether the username exists.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Bot Marketplaces as a Source of Future Data Breaches πŸ•΄

Of the four bot marketplaces Cognyte analyzed, the Russian Market is the most dominant, but the others are all active, updated daily, and well-known, too.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Data Transparency Hasn't Made Us Safer Yet. Can It Uncover Breach Causality? πŸ•΄

Advanced machine learning models within an XDR framework could uncover what actually causes breaches, but first we need better data transparency.

πŸ“– Read

via "Dark Reading".
❌ SAP to Give Threat Briefing on Uber-Severe β€˜ICMAD’ Bugs ❌

SAP’s Patch Tuesday brought fixes for a trio of flaws in the ubiquitous ICM component in internet-exposed apps. One of them, with a risk score of 10, could allow attackers to hijack identities, steal data and more.

πŸ“– Read

via "Threat Post".
πŸ›  nfstream 6.4.1 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2022-24111 β€Ό

In Mahara 21.04 before 21.04.3 and 21.10 before 21.10.1, portfolios created in groups that have not been shared with non-group members and portfolios created on the site and institution levels can be viewed without requiring a login if the URL to these portfolios is known.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Ransomware surge prompts joint NCSC, CISA warning to safeguard systems πŸ—“οΈ

Weekend attacks and assaults on the software supply chain mark evolving TTPs

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Titaniam Secures $6 Million in Seed Funding πŸ•΄

Funding round led by Refinery Ventures, with participation from Fusion Fund and Shasta Ventures.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Allure Security Raises $6.8 Million Seed Funding Round πŸ•΄

Funding led by Gutbrain Ventures.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-20701 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0017 β€Ό

An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows. GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.5 on Windows. This issue does not affect GlobalProtect app on other platforms.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0019 β€Ό

An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target userΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-20707 β€Ό

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".