βοΈ Russian Govt. Continues Carding Shop Crackdown βοΈ
π Read
via "Krebs on Security".
Russian authorities have arrested six men accused of operating some of the most active online bazaars for selling stolen payment card data. The crackdown -- the second closure of major card fraud shops by Russian authorities in as many weeks -- comes closely behind Russia's arrest of 14 alleged affiliates of the REvil ransomware gang, and has many in the cybercrime underground asking who might be next.π Read
via "Krebs on Security".
Krebs on Security
Russian Govt. Continues Carding Shop Crackdown
Russian authorities have arrested six men accused of operating some of the most active online bazaars for selling stolen payment card data. The crackdown -- the second closure of major card fraud shops by Russian authorities in as many weeksβ¦
β PHP Everywhere Bugs Put 30K+ WordPress Sites at Risk of RCE β
π Read
via "Threat Post".
The plug-inβs default settings spawned flaws that could allow for full site takeover but have since been fixed in an update that users should immediately install, Wordfence researchers said.π Read
via "Threat Post".
Threat Post
PHP Everywhere Bugs Put 30K+ WordPress Sites at Risk of RCE
The plug-inβs default settings spawned flaws that could allow for full site takeover but have since been fixed in an update that users should immediately install, Wordfence researchers said.
βΌ CVE-2021-45901 βΌ
π Read
via "National Vulnerability Database".
The password-reset form in ServiceNow Orlando provides different responses to invalid authentication attempts depending on whether the username exists.π Read
via "National Vulnerability Database".
π΄ Bot Marketplaces as a Source of Future Data Breaches π΄
π Read
via "Dark Reading".
Of the four bot marketplaces Cognyte analyzed, the Russian Market is the most dominant, but the others are all active, updated daily, and well-known, too.π Read
via "Dark Reading".
Dark Reading
Bot Marketplaces as a Source of Future Data Breaches
Of the four bot marketplaces Cognyte analyzed, the Russian Market is the most dominant, but the others are all active, updated daily, and well-known, too.
π΄ Data Transparency Hasn't Made Us Safer Yet. Can It Uncover Breach Causality? π΄
π Read
via "Dark Reading".
Advanced machine learning models within an XDR framework could uncover what actually causes breaches, but first we need better data transparency.π Read
via "Dark Reading".
Dark Reading
Data Transparency Hasn't Made Us Safer Yet. Can It Uncover Breach Causality?
Advanced machine learning models within an XDR framework could uncover what actually causes breaches, but first we need better data transparency.
β SAP to Give Threat Briefing on Uber-Severe βICMADβ Bugs β
π Read
via "Threat Post".
SAPβs Patch Tuesday brought fixes for a trio of flaws in the ubiquitous ICM component in internet-exposed apps. One of them, with a risk score of 10, could allow attackers to hijack identities, steal data and more.π Read
via "Threat Post".
Threat Post
SAP to Give Threat Briefing on Uber-Severe βICMADβ Bugs
SAPβs Patch Tuesday brought fixes for a trio of flaws in the ubiquitous ICM component in internet-exposed apps. One of them, with a risk score of 10, could allow attackers to hijack identities, steal data and more.
π nfstream 6.4.1 π
π Read
via "Packet Storm Security".
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.π Read
via "Packet Storm Security".
Packetstormsecurity
nfstream 6.4.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
βΌ CVE-2022-24111 βΌ
π Read
via "National Vulnerability Database".
In Mahara 21.04 before 21.04.3 and 21.10 before 21.10.1, portfolios created in groups that have not been shared with non-group members and portfolios created on the site and institution levels can be viewed without requiring a login if the URL to these portfolios is known.π Read
via "National Vulnerability Database".
ποΈ Ransomware surge prompts joint NCSC, CISA warning to safeguard systems ποΈ
π Read
via "The Daily Swig".
Weekend attacks and assaults on the software supply chain mark evolving TTPsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Ransomware surge prompts joint NCSC, CISA warning to safeguard systems
Weekend attacks and assaults on the software supply chain mark evolving TTPs
π΄ Titaniam Secures $6 Million in Seed Funding π΄
π Read
via "Dark Reading".
Funding round led by Refinery Ventures, with participation from Fusion Fund and Shasta Ventures.π Read
via "Dark Reading".
Dark Reading
Titaniam Secures $6 Million in Seed Funding
Funding round led by Refinery Ventures, with participation from Fusion Fund and Shasta Ventures.
π΄ Allure Security Raises $6.8 Million Seed Funding Round π΄
π Read
via "Dark Reading".
Funding led by Gutbrain Ventures.π Read
via "Dark Reading".
Dark Reading
Allure Security Raises $6.8 Million Seed Funding Round
Funding led by Gutbrain Ventures.
βΌ CVE-2022-20701 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0017 βΌ
π Read
via "National Vulnerability Database".
An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows. GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.5 on Windows. This issue does not affect GlobalProtect app on other platforms.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0019 βΌ
π Read
via "National Vulnerability Database".
An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target userΓΒ’Γ’β¬ÒβΒ’s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-20707 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.π Read
via "National Vulnerability Database".
βΌ CVE-2021-3398 βΌ
π Read
via "National Vulnerability Database".
Stormshield Network Security (SNS) 3.x has an Integer Overflow in the high-availability component.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20709 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20708 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20699 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0021 βΌ
π Read
via "National Vulnerability Database".
An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows. This issue does not affect the GlobalProtect app on other platforms.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0020 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in Palo Alto Network Cortex XSOAR web interface enables an authenticated network-based attacker to store a persistent javascript payload that will perform arbitrary actions in the Cortex XSOAR web interface on behalf of authenticated administrators who encounter the payload during normal operations. This issue impacts: All builds of Cortex XSOAR 6.1.0; Cortex XSOAR 6.2.0 builds earlier than build 1958888.π Read
via "National Vulnerability Database".