πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ If the Cloud Is More Secure, Then Why Is Everything Still Broken? πŸ•΄

The sooner we discover sources of risk, the better equipped we will be to create effective mitigations for them.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Ransomware Adds New Wrinkle in Russian Cybercrime Market πŸ•΄

Government crackdowns may destabilize Russian crime rings and strengthen their ties to Chinese allies.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-0664 β€Ό

Use of Hard-coded Cryptographic Key in Go github.com/gravitl/netmaker prior to 0.8.5,0.9.4,0.10.0,0.10.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25299 β€Ό

This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25298 β€Ό

This affects the package sprinfall/webcc before 0.3.0. It is possible to traverse directories to fetch arbitrary files from the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0451 β€Ό

Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK to version 2.16.0 or beyond.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46372 β€Ό

Scoold 1.47.2 is a Q&A/knowledge base platform written in Java. When writing a Q&A, the markdown editor is vulnerable to a XSS attack when using uppercase letters.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0631 β€Ό

Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep70: Bitcoin, billing blunders, and 0-day after 0-day after 0-day [Podcast + Transcript] ⚠

Latest episode - listen and learn!

πŸ“– Read

via "Naked Security".
πŸ•΄ Enterprises Look Beyond Antivirus Software for Remote Workers πŸ•΄

Priorities are shifting, with growing emphasis on endpoint detection and response (EDR) software and multifactor authentication (MFA), a recent survey of IT professionals shows.

πŸ“– Read

via "Dark Reading".
❌ New Critical RCE Bug Found in Adobe Commerce, Magento ❌

Adobe updated its recent out-of-band security advisory to add another critical bug, while researchers put out a PoC for the one it emergency-fixed last weekend.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-0666 β€Ό

CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23647 β€Ό

Prism is a syntax highlighting library. Starting with version 1.14.0 and prior to version 1.27.0, Prism's command line plugin can be used by attackers to achieve a cross-site scripting attack. The command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. This bug has been fixed in v1.27.0. As a workaround, do not use the command line plugin on untrusted inputs, or sanitize all code blocks (remove all HTML code text) from all code blocks that use the command line plugin.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Red Cross servers β€˜were hacked via unpatched ManageEngine flaw’ πŸ—“οΈ

Humanitarian organization failed to apply fix rolled out a couple of months earlier

πŸ“– Read

via "The Daily Swig".
⚠ Irony alert! PHP fixes security flaw in input validation code ⚠

What's wrong with this sequence? 1. Step into the road 2. Check if it's safe 3. Keep on walki...

πŸ“– Read

via "Naked Security".
πŸ•΄ Free Cybersecurity Tools and Services List Published by CISA πŸ•΄

The Cybersecurity & Infrastructure Security Agency (CISA) says this "living repository" is a mix of popular open source and free tools and services from both the private and public sectors.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Why You Need An Adversary-First Approach to Threats in the Cloud πŸ•΄

Security teams need an adversary-focused approach that automates security controls and compliance and provides visibility into the cloud environment.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-3930 β€Ό

An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39026 β€Ό

IBM Guardium Data Encryption (GDE) 5.0.0.2 and 5.0.0.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 213964.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24445 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21196 β€Ό

MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 does not perform proper authorization and authentication checks on multiple API routes. An attacker may gain access to these API routes and achieve remote code execution, create a denial-of-service condition, and obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".