πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-24409 β€Ό

Only customers with active BSAFE maintenance contracts can receive details about this vulnerability. Public disclosure of the vulnerability details will be shared at a later date.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cloud Storage Leaks Grew by 150% in 2021, New CybelAngel Report Reveals πŸ•΄

An increase in outsourced development projects also led to a 66% increase in source code leaks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Darktrace Acquires Attack Surface Management Company Cybersprint πŸ•΄

Through this acquisition, Darktrace gains a second European R&D centre in The Hague, Netherlands.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-23653 β€Ό

B2 Command Line Tool is the official command line tool for the backblaze cloud storage service. Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/account_info`, `~/.b2_account_info` or a user-defined path) when `b2 authorize-account` is first run. This happens regardless of whether a valid key is provided or not. When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory is readable by a local attacker and the user did not yet run `b2 authorize-account` then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Users that have not yet run `b2 authorize-account` should upgrade to B2 Command-Line Tool v3.2.1 before running it. Users that have run `b2 authorize-account` are safe if at the time of the file creation no other local users had read access to the local configuration file. Users that have run `b2 authorize-account` where the designated path could be opened by another local user should upgrade to B2 Command-Line Tool v3.2.1 and remove the database and regenerate all application keys. Note that `b2 clear-account` does not remove the database file and it should not be used to ensure that all open handles to the file are invalidated. If B2 Command-Line Tool cannot be upgraded to v3.2.1 due to a dependency conflict, a binary release can be used instead. Alternatively a new version could be installed within a virtualenv, or the permissions can be changed to prevent local users from opening the database file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23651 β€Ό

b2-sdk-python is a python library to access cloud storage provided by backblaze. Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. SDK users of the SqliteAccountInfo format are vulnerable while users of the InMemoryAccountInfo format are safe. The SqliteAccountInfo saves API keys (and bucket name-to-id mapping) in a local database file ($XDG_CONFIG_HOME/b2/account_info, ~/.b2_account_info or a user-defined path). When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory containing the file is readable by a local attacker then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Consumers of this SDK who rely on it to save data using SqliteAccountInfo class should upgrade to the latest version of the SDK. Those who believe a local user might have opened a handle using this race condition, should remove the affected database files and regenerate all application keys. Users should upgrade to b2-sdk-python 1.14.1 or later.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘2
β€Ό CVE-2022-23655 β€Ό

Octobercms is a self-hosted CMS platform based on the Laravel PHP Framework. Affected versions of OctoberCMS did not validate gateway server signatures. As a result non-authoritative gateway servers may be used to exfiltrate user private keys. Users are advised to upgrade their installations to build 474 or v1.1.10. The only known workaround is to manually apply the patch (e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a) which adds server signature validation.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ—“οΈ Zero-day XSS vulnerability in Horde webmail client can be triggered by file preview function πŸ—“οΈ

Researchers release details of unpatched security flaw

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ US fraudster jailed over $300k business email compromise scheme πŸ—“οΈ

Scheme unraveled when defendant tried to cash ill-gotten gains

πŸ“– Read

via "The Daily Swig".
⚠ Apple AirTag anti-stalking protection bypassed by researchers ⚠

Problems with Apple's Tracker Detect system, which warns you of likely stalking attempts using hidden AirTags.

πŸ“– Read

via "Naked Security".
πŸ•΄ New York Opens Joint Security Operations Center in NYC πŸ•΄

The "first-in-nation" cyber command center will provide municipal and local governments with threat intelligence and resources to defend themselves against cyberattacks.

πŸ“– Read

via "Dark Reading".
πŸ‘1
❌ The Art of Non-boring Cybersec Training–Podcast ❌

With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress balls and management buy-in.

πŸ“– Read

via "Threat Post".
πŸ•΄ SaaS in the Enterprise: The Good, the Bad, and the Unknown πŸ•΄

SaaS offers many benefits to the enterprise, but security issues left unchecked can mitigate value.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-0695 β€Ό

Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.

πŸ“– Read

via "National Vulnerability Database".
❌ Cyberattackers Leverage DocuSign to Steal Microsoft Outlook Logins ❌

A targeted phishing attack takes aim at a major U.S. payments company.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Data wiper deployed in cyber-attacks targeting Ukrainian systems πŸ—“οΈ

Newly named β€˜HermeticWiper’ malware discovered on hundreds of endpoints

πŸ“– Read

via "The Daily Swig".
🀯1
πŸ•΄ JupiterOne Unveils Starbase for Graph-Based ο»ΏSecurity πŸ•΄

The open source asset management tool lets security analysts collect asset information all across the organization's digital operations and run queries to understand their relationships.

πŸ“– Read

via "Dark Reading".
πŸ›  Packet Fence 11.2.0 πŸ› 

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Illusive Launches Identity Risk Management Platform πŸ•΄

Illusive Spotlight automatically and continuously discovers and mitigates privileged identity risks, while Illusive Shadow protects against identity risks that can't be readily remediated.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Businesses Are at Significant Risk of Cybersecurity Breaches Due to Immature Security Hygiene and Posture Management Practices πŸ•΄

Seven out of 10 organizations experienced a cyberattack that started through the exploit of unknown or poorly managed technology assets, according to Enterprise Strategy Group research.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-24633 β€Ό

All versions of FileCloud prior to 21.3 are vulnerable to user enumeration. The vulnerability exists in the parameter "path" passing "/SHARED/<username>". A malicious actor could identify the existence of users by requesting share information on specified share paths.

πŸ“– Read

via "National Vulnerability Database".