πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Cybercrooks Frame Targets by Planting Fabricated Digital Evidence ❌

The β€˜ModifiedElephant’ threat actors are technically unimpressive, but they’ve evaded detection for a decade, hacking human rights advocates' systems with dusty old keyloggers and off-the-shelf RATs.

πŸ“– Read

via "Threat Post".
πŸ•΄ Google Paid Record $8.7 Million to Bug Hunters in 2021 πŸ•΄

Company's Chrome and Android technologies continued to be target-rich environments for security researchers from around the world.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-23555 β€Ό

The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22766 β€Ό

Hardcoded credentials are used in specific BD Pyxis products. If exploited, threat actors may be able to gain access to the underlying file system and could potentially exploit application files for information that could be used to decrypt application credentials or gain access to electronic protected health information (ePHI) or other sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24975 β€Ό

The --mirror documentation for Git through 2.35.1 does not mention the availability of deleted content, aka the "GitBleed" issue. This could present a security risk if information-disclosure auditing processes rely on a clone operation without the --mirror option.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20001 β€Ό

It was discovered, that debian-edu-config, a set of configuration files used for the Debian Edu blend, before 2.12.16 configured insecure permissions for the user web shares (~/public_html), which could result in privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26728 β€Ό

A vulnerability was discovered in Tenda AC9 v3.0 V15.03.06.42_multi and Tenda AC9 V1.0 V15.03.05.19(6318)_CN which allows for remote code execution via shell metacharacters in the guestuser field to the __fastcall function with a POST request.

πŸ“– Read

via "National Vulnerability Database".
❌ Critical MQTT-Related Bugs Open Industrial Networks to RCE Via Moxa ❌

A collection of five security vulnerabilities with a collective CVSS score of 10 out of 10 threaten critical infrastructure environments that use Moxa MXview.

πŸ“– Read

via "Threat Post".
πŸ•΄ Aviatrix Enhances Secure Cloud Networking with Network Behavior Analytics πŸ•΄

New capabilities added to Aviatrix ThreatIQ improve enterprise security posture to reduce business risk.

πŸ“– Read

via "Dark Reading".
πŸ•΄ DDoS Attacks on a Tear in Q4 2021 πŸ•΄

New data from Kaspersky shows distributed denial-of-service attacks increased by more than 50% in the fourth quarter of last year compared with the third quarter.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-24968 β€Ό

In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46365 β€Ό

An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted XLF file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46361 β€Ό

An issue in the Freemark Filter of Magnolia CMS v6.2.11 and below allows attackers to bypass security restrictions and execute arbitrary code via a crafted FreeMarker payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46364 β€Ό

A vulnerability in the Snake YAML parser of Magnolia CMS v6.2.3 and below allows attackers to execute arbitrary code via a crafted YAML file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46362 β€Ό

A Server-Side Template Injection (SSTI) vulnerability in the Registration and Forgotten Password forms of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted payload entered into the fullname parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46363 β€Ό

An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted CSV/XLS file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46366 β€Ό

An issue in the Login page of Magnolia CMS v6.2.3 and below allows attackers to exploit both an Open Redirect vulnerability and Cross-Site Request Forgery (CSRF) in order to brute force and exfiltrate users' credentials.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23633 β€Ό

Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23634 β€Ό

Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Sophos to launch new data centre in Mumbai πŸ“’

The cyber security company will help organisations to comply with strict data sovereignty laws and regulations

πŸ“– Read

via "ITPro".
πŸ“’ Google Cloud adds cryptomining protection following widespread exploitation πŸ“’

In nearly all cases of compromised Google Cloud instances, cryptomining malware was installed within 22 seconds

πŸ“– Read

via "ITPro".