βΌ CVE-2022-25236 βΌ
π Read
via "National Vulnerability Database".
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25241 βΌ
π Read
via "National Vulnerability Database".
In FileCloud before 21.3, the CSV user import functionality is vulnerable to Cross-Site Request Forgery (CSRF).π Read
via "National Vulnerability Database".
βΌ CVE-2022-25235 βΌ
π Read
via "National Vulnerability Database".
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.π Read
via "National Vulnerability Database".
π΄ Infineonβs Latest Chip Tackles Post-Quantum Security π΄
π Read
via "Dark Reading".
Infineonβs latest Trusted Platform Module has a mechanism to still update device firmware after quantum computing breaks existing algorithms.π Read
via "Dark Reading".
Dark Reading
Infineonβs Latest Chip Tackles Post-Quantum Security
Infineonβs latest Trusted Platform Module has a mechanism to still update device firmware after quantum computing breaks existing algorithms.
βΌ CVE-2022-23358 βΌ
π Read
via "National Vulnerability Database".
EasyCMS v1.6 allows for SQL injection via ArticlemAction.class.php. In the background, search terms provided by the user were not sanitized and were used directly to construct a SQL statement.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46388 βΌ
π Read
via "National Vulnerability Database".
WAGO 750-8212 PFC200 G2 2ETH RS Firmware version 03.05.10(17) is affected by a privilege escalation vulnerability. Improper handling of user cookies leads to escalating privileges to administrative account of the router.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0559 βΌ
π Read
via "National Vulnerability Database".
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.π Read
via "National Vulnerability Database".
β Emotet Now Spreading Through Malicious Excel Files β
π Read
via "Threat Post".
An ongoing malicious email campaign that includes macro-laden files and multiple layers of obfuscation has been active since late December.π Read
via "Threat Post".
Threat Post
Emotet Now Spreading Through Malicious Excel Files
An ongoing malicious email campaign that includes macro-laden files and multiple layers of obfuscation has been active since late December.
ποΈ Poisoned pipelines: Security researcher explores attack methods in CI environments ποΈ
π Read
via "The Daily Swig".
Attack vector abuses permissions to force CI pipelines to execute arbitrary commandsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Poisoned pipelines: Security researcher explores attack methods in CI environments
Attack vector abuses permissions to force CI pipelines to execute arbitrary commands
π΄ Be Flexible About Where People Work β But Not on Data Privacy π΄
π Read
via "Dark Reading".
If your policies don't keep up with your work models, your company's sensitive information could be at risk.π Read
via "Dark Reading".
Dark Reading
Be Flexible About Where People Work β But Not on Data Privacy
If your policies don't keep up with your work models, your company's sensitive information could be at risk.
π΄ Hybrid Work Accelerated Fraud; Now, CSOs Are Taking a Seat at the Executive Table π΄
π Read
via "Dark Reading".
The days of security as a second-class citizen are over.π Read
via "Dark Reading".
Dark Reading
Hybrid Work Accelerated Fraud; Now CSOs Join Executives
The days of security as a second-class citizen are over.
βΌ CVE-2021-45391 βΌ
π Read
via "National Vulnerability Database".
A Buffer Overflow vulnerability exists in Tenda Router AX12 V22.03.01.21_CN in the sub_422CE4 function in the goform/setIPv6Status binary file /usr/sbin/httpd via the conType parameter, which causes a Denial of Service.π Read
via "National Vulnerability Database".
ποΈ MFA fatigue attacks: Users tricked into allowing device access due to overload of push notifications ποΈ
π Read
via "The Daily Swig".
Social engineering technique confuses victims to gain entry to their accountsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
MFA fatigue attacks: Users tricked into allowing device access due to overload of push notifications
Social engineering technique confuses victims to gain entry to their accounts
β High-Severity RCE Bug Found in Popular Apache Cassandra Database β
π Read
via "Threat Post".
On the plus side, only instances with non-standard not recommended configurations are vulnerable. On the downside, those configurations aren't easy to track down, and it's easy as pie to exploit.π Read
via "Threat Post".
Threat Post
High-Severity RCE Bug Found in Popular Apache Cassandra Database
On the plus side, only instances with non-standard not recommended configurations are vulnerable. On the downside, those configurations aren't easy to track down, and it's easy as pie to exploit.
β Critical VMware Bugs Open ESXi, Fusion & Workstation to Attackers β
π Read
via "Threat Post".
A group of five security vulnerabilities could lead to a range of bad outcomes for virtual-machine enthusiasts, including command execution and DoS.π Read
via "Threat Post".
Threat Post
Critical VMware Bugs Open ESXi, Fusion & Workstation to Attackers
A group of five security vulnerabilities could lead to a range of bad outcomes for virtual-machine enthusiasts, including command execution and DoS.
βοΈ Red Cross Hack Linked to Iranian Influence Operation? βοΈ
π Read
via "Krebs on Security".
A network intrusion at the International Committee for the Red Cross (ICRC) in January led to the theft of personal information on more than 500,000 people receiving assistance from the group. KrebsOnSecurity has learned that the email address used by a cybercriminal actor who offered to sell the stolen ICRC data also was used to register multiple domain names the FBI says are tied to a sprawling media influence operation originating from Iran.π Read
via "Krebs on Security".
Krebs on Security
Red Cross Hack Linked to Iranian Influence Operation?
A network intrusion at the International Committee for the Red Cross (ICRC) in January led to the theft of personal information on more than 500,000 people receiving assistance from the group. KrebsOnSecurity has learned that the email address used byβ¦
π΄ Where AI Falls Down in Cybersecurity π΄
π Read
via "Dark Reading".
Almost every cybersecurity product claims to incorporate AI. Sometimes, though, that's a mirage.π Read
via "Dark Reading".
Dark Reading
DR Technology
βΌ CVE-2021-26726 βΌ
π Read
via "National Vulnerability Database".
A remote code execution vulnerability affecting a Valmet DNA service listening on TCP port 1517, allows an attacker to execute commands with SYSTEM privileges This issue affects: Valmet DNA versions from Collection 2012 until Collection 2021.π Read
via "National Vulnerability Database".
β VMWare fixes holes that could allow virtual machine escapes β
π Read
via "Naked Security".
Hats off to VMWare for not using weasel words: "When should you act?" Immediately...π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Laminar Announces General Availability of Cloud Data Security Platform π΄
π Read
via "Dark Reading".
Solution monitors and protects public cloud data.π Read
via "Dark Reading".
Dark Reading
Laminar Announces General Availability of Cloud Data Security Platform
Solution monitors and protects public cloud data.
π΄ DoD Awards Attivo Networks Contract for Ransomware Mitigation π΄
π Read
via "Dark Reading".
Contract extends Attivoβs strategic support to the three major branches of the DoD β Air Force, Army, and Navy.π Read
via "Dark Reading".
Dark Reading
DoD Awards Attivo Networks Contract for Ransomware Mitigation
Contract extends Attivoβs strategic support to the three major branches of the DoD β Air Force, Army, and Navy.