βΌ CVE-2022-22899 βΌ
π Read
via "National Vulnerability Database".
Core FTP / SFTP Server v2 Build 725 was discovered to allow unauthenticated attackers to cause a Denial of Service (DoS) via a crafted packet through the SSH service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23319 βΌ
π Read
via "National Vulnerability Database".
A segmentation fault during PCF file parsing in pcf2bdf versions >=1.05 allows an attacker to trigger a program crash via a specially crafted PCF font file. This crash affects the availability of the software and dependent downstream components.π Read
via "National Vulnerability Database".
ποΈ Microsoft bolsters Edge browser security with enhanced features ποΈ
π Read
via "The Daily Swig".
Latest protections unveiledπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Microsoft bolsters Edge browser security with enhanced features
Latest protections unveiled
β Ukrainian DDoS Attacks Should Put US on NoticeβResearchers β
π Read
via "Threat Post".
On Tuesday, institutions central to Ukraineβs military and economy were hit with denial-of-service (DoS) attacks. Impact was limited, but the ramifications are not.π Read
via "Threat Post".
Threat Post
Ukrainian DDoS Attacks Should Put US on NoticeβResearchers
On Tuesday, institutions central to Ukraineβs military and economy were hit with denial-of-service (DoS) attacks. Impact was limited, but the ramifications are not.
βΌ CVE-2022-20659 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20653 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44868 βΌ
π Read
via "National Vulnerability Database".
A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.doπ Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-20750 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the checkpoint manager implementation of Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS Software could allow an unauthenticated, remote attacker to cause the checkpoint manager process to restart upon receipt of malformed TCP data. This vulnerability is due to improper input validation of an ingress TCP packet. An attacker could exploit this vulnerability by sending crafted TCP data to the affected application. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the checkpoint manager process restarting.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23632 βΌ
π Read
via "National Vulnerability Database".
Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.6.1, Traefik skips the router transport layer security (TLS) configuration when the host header is a fully qualified domain name (FQDN). For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration. When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS configuration falls back to the default configuration that might not correspond to the configured one. If the CNAME flattening is enabled, the selected TLS configuration is the SNI one and the routing uses the CNAME value, so this can skip the expected TLS configuration. Version 2.6.1 contains a patch for this issue. As a workaround, one may add the FDQN to the host rule. However, there is no workaround if the CNAME flattening is enabled.π Read
via "National Vulnerability Database".
β S3 Ep70: Bitcoin, billing blunders, and 0-day after 0-day after 0-day [Podcast + Transcript] β
π Read
via "Naked Security".
Latest episode - listen and learn!π Read
via "Naked Security".
Naked Security
S3 Ep70: Bitcoin, billing blunders, and 0-day after 0-day after 0-day [Podcast + Transcript]
Latest episode β listen and learn!
β Baby Golang-Based Botnet Already Pulling in $3K/Month for Operators β
π Read
via "Threat Post".
Kraken has already spread like wildfire, but in the past few months, the malware's author has been tinkering away, adding more infostealers and backdoors.π Read
via "Threat Post".
Threat Post
Baby Golang-Based Botnet Already Pulling in $3K/Month for Operators
Newborn as it is, the Kraken botnet has already spread like wildfire, thanks to the malware's author tinkering away over the past few months, adding more infostealers and backdoors.
π΄ Software-Developer Security Vendor Snyk Buys Cloud Security Company π΄
π Read
via "Dark Reading".
Acquisition helps expand Snyk into the cloud security sector.π Read
via "Dark Reading".
Dark Reading
Software-Developer Security Vendor Snyk Buys Cloud Security Company
Acquisition helps expand Snyk into the cloud security sector.
βΌ CVE-2022-24683 βΌ
π Read
via "National Vulnerability Database".
HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and 1.2.5 allow operators with read-fs and alloc-exec (or job-submit) capabilities to read arbitrary files on the host filesystem as root.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39034 βΌ
π Read
via "National Vulnerability Database".
IBM MQ 9.1 LTS is vulnerable to a denial of service attack caused by an issue within the channel process. IBM X-Force ID: 213964.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0638 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber prior to 1.2.11.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0639 βΌ
π Read
via "National Vulnerability Database".
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.π Read
via "National Vulnerability Database".
π΄ Security Teams Expect Attackers to Go After End Users First π΄
π Read
via "Dark Reading".
Phishing, malware, and ransomware have spurred organizations to increase their investments in endpoint security, according to Dark Readingβs Endpoint Security Survey.π Read
via "Dark Reading".
Dark Reading
Security Teams Expect Attackers to Go After End Users First
Phishing, malware, and ransomware have spurred organizations to increase their investments in endpoint security, according to Dark Readingβs Endpoint Security Survey.
π΄ Confluera Cloud Research Finds Cybersecurity Concern as Biggest Obstacle to Cloud and Multicloud Adoption π΄
π Read
via "Dark Reading".
Meanwhile, 84% of IT leaders are optimistic about their cybersecurity readiness for 2022.π Read
via "Dark Reading".
Dark Reading
Confluera Cloud Research Finds Cybersecurity Concern as Biggest Obstacle to Cloud and Multicloud Adoption
Meanwhile, 84% of IT leaders are optimistic about their cybersecurity readiness for 2022.
π΄ Attackers Hone Their Playbooks, Become More Agile π΄
π Read
via "Dark Reading".
Less malware, more interactive intrusions, and big game hunting lead to more success, with an 82% increase in ransomware-related data leaks.π Read
via "Dark Reading".
Dark Reading
Attackers Hone Their Playbooks, Become More Agile
Less malware, more interactive intrusions, and big game hunting lead to more success, with an 82% increase in ransomware-related data leaks.
π΄ Darktrace Artificial Intelligence Stops Cyberattack at Italian Electronics Distributor π΄
π Read
via "Dark Reading".
Vulnerability allows attackers to run arbitrary commands, including the ability to delete, modify, and exfiltrate private source code.π Read
via "Dark Reading".
Dark Reading
Darktrace Artificial Intelligence Stops Cyberattack at Italian Electronics Distributor
Vulnerability allows attackers to run arbitrary commands, including the ability to delete, modify, and exfiltrate private source code.
π΄ Neustar Security Services Report Highlights Shifts in Threat Landscape Amid Maturing Cybercrime Economy π΄
π Read
via "Dark Reading".
Carpet bombing attacks increase sharply in 2021, along with complex multivector attacks.π Read
via "Dark Reading".
Dark Reading
Neustar Security Services Report Highlights Shifts in Threat Landscape Amid Maturing Cybercrime Economy
Carpet bombing attacks increase sharply in 2021, along with complex multivector attacks.