πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ SquirrelWaffle Adds a Twist of Fraud to Exchange Server Malspamming ❌

Researchers have never before seen SquirrelWaffle attackers use typosquatting to keep sending spam once a targeted Exchange server has been patched for ProxyLogon/ProxyShell.

πŸ“– Read

via "Threat Post".
πŸ•΄ FBI, US Secret Service Issue Mitigations for BlackByte Ransomware πŸ•΄

Joint Cybersecurity Advisory from federal law enforcement includes indicators of compromise associated with the ransomware variant.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Akamai To Acquire Linode πŸ•΄

Akamai will discuss the acquisition on its Q4 and year end 2021 financial results conference call today, February 15, at 4:30 p.m. ET.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Securonix Secures Over $1B in Growth Investment From Vista Equity πŸ•΄

Deal is the second one topping $1 billion since November and sets the stage for what could be another record-breaking year for investment in the cybersecurity industry.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-23643 β€Ό

Sourcegraph is a code search and navigation engine. Sourcegraph versions 3.35 and 3.36 reintroduced a previously fixed side-channel vulnerabilitity in the Code Monitoring feature where strings in private source code could be guessed by an authenticated but unauthorized actor. This issue affects only the Code Monitoring feature, whereas CVE-2021-43823 also affected saved searches. A successful attack would require an authenticated bad actor to create many Code Monitors to receive confirmation that a specific string exists. This could allow an attacker to guess formatted tokens in source code, such as API keys. This issue was patched in versions 3.35.2 and 3.36.3 of Sourcegraph. Those who are unable to upgrade may disable the Code Monitor feature in their installation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23641 β€Ό

Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.beta2 of the `tests-passed` branch. As a workaround, disable onebox in admin panel completely or specify allow list of domains that will be oneboxed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35380 β€Ό

A Directory Traversal vulnerability exists in Solari di Udine TermTalk Server (TTServer) 3.24.0.2, which lets an unauthenticated malicious user gain access to the files on the remote system by gaining access to the relative path of the file they want to download (http://url:port/file?valore).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46251 β€Ό

A reflected cross-site scripting (XSS) in ScratchOAuth2 before commit 1603f04e44ef67dde6ccffe866d2dca16defb293 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46250 β€Ό

An issue in SOA2Login::commented of ScratchOAuth2 before commit a91879bd58fa83b09283c0708a1864cdf067c64a allows attackers to authenticate as other users on downstream components that rely on ScratchOAuth2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46252 β€Ό

A Cross-Site Request Forgery (CSRF) in RequirementsBypassPage.php of Scratch Wiki scratch-confirmaccount-v3 allows attackers to modify account request requirement bypasses.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0611 β€Ό

Improper Privilege Management in Packagist snipe/snipe-it prior to 5.3.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46249 β€Ό

An authorization bypass exploited by a user-controlled key in SpecificApps REST API in ScratchOAuth2 before commit d856dc704b2504cd3b92cf089fdd366dd40775d6 allows app owners to set flags that indicate whether an app is verified on their own apps.

πŸ“– Read

via "National Vulnerability Database".
⚠ Google announces zero-day in Chrome browser – update now! ⚠

Zero-day buses: none for a while, then three at once. Here's Google joining Apple and Adobe in "zero-day week"

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-25242 β€Ό

In FileCloud before 21.3, file upload is not protected against Cross-Site Request Forgery (CSRF).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25236 β€Ό

xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25241 β€Ό

In FileCloud before 21.3, the CSV user import functionality is vulnerable to Cross-Site Request Forgery (CSRF).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25235 β€Ό

xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Infineon’s Latest Chip Tackles Post-Quantum Security πŸ•΄

Infineon’s latest Trusted Platform Module has a mechanism to still update device firmware after quantum computing breaks existing algorithms.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-23358 β€Ό

EasyCMS v1.6 allows for SQL injection via ArticlemAction.class.php. In the background, search terms provided by the user were not sanitized and were used directly to construct a SQL statement.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46388 β€Ό

WAGO 750-8212 PFC200 G2 2ETH RS Firmware version 03.05.10(17) is affected by a privilege escalation vulnerability. Improper handling of user cookies leads to escalating privileges to administrative account of the router.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0559 β€Ό

Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.

πŸ“– Read

via "National Vulnerability Database".