ποΈ Critical GitLab vulnerability could allow attackers to steal runner registration tokens ποΈ
π Read
via "The Daily Swig".
Flaw present in multiple versions of DevOps platform β update nowπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Critical GitLab vulnerability could allow attackers to steal runner registration tokens
Flaw present in multiple versions of DevOps platform β update now
π1
π΄ Beyond the Hype: AI's Future in Defensive Cybersecurity π΄
π Read
via "Dark Reading".
Hybridizing signatures with artificial intelligence is making a significant difference in our ability to detect cyberattacks, including ransomware.π Read
via "Dark Reading".
Dark Reading
Beyond the Hype: AI's Future in Defensive Cybersecurity
Hybridizing signatures with artificial intelligence is making a significant difference in our ability to detect cyberattacks, including ransomware.
ποΈ Private chat? Chrome Skype extension with 9m installs found to be leaking user info ποΈ
π Read
via "The Daily Swig".
Microsoft addresses issue at eleventh hour, as researcher publicly discloses βtrivialβ privacy bug in browser pluginπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Private chat? Chrome Skype extension with 9m installs found to be leaking user info
Microsoft addresses issue at eleventh hour, as researcher publicly discloses βtrivialβ privacy bug in browser plugin
βΌ CVE-2022-23380 βΌ
π Read
via "National Vulnerability Database".
There is a SQL injection vulnerability in the background of taocms 3.0.2 in parameter id:action=admin&id=2&ctrl=edit.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23377 βΌ
π Read
via "National Vulnerability Database".
Archeevo below 5.0 is affected by local file inclusion through file=~/web.config to allow an attacker to retrieve local files.π Read
via "National Vulnerability Database".
ποΈ Toyota shuts down production after βcyber-attackβ on supplier ποΈ
π Read
via "The Daily Swig".
JITter in the supply chainπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Toyota shuts down production after βcyber-attackβ on supplier
JITter in the supply chain
π1
β Ukraine Hit with Novel βFoxBladeβ Trojan Hours Before Invasion β
π Read
via "Threat Post".
Microsoft detected cyberattacks launched against Ukraine hours before Russiaβs tanks and missiles began to pummel the country last week.π Read
via "Threat Post".
Threat Post
Ukraine Hit with Novel βFoxBladeβ Trojan Hours Before Invasion
Microsoft detected cyberattacks launched against Ukraine hours before Russiaβs tanks and missiles began to pummel the country last week.
β Instagram scammers as busy as ever: passwords and 2FA codes at risk β
π Read
via "Naked Security".
Instagram scams don't seem to be dying out - we're seeing more variety and trickiness than ever...π Read
via "Naked Security".
βΌ CVE-2021-44238 βΌ
π Read
via "National Vulnerability Database".
AyaCMS 3.1.2 is vulnerable to Remote Code Execution (RCE) via /aya/module/admin/ust_tab_e.inc.php,π Read
via "National Vulnerability Database".
βΌ CVE-2021-46387 βΌ
π Read
via "National Vulnerability Database".
ZyXEL ZyWALL 2 Plus Internet Security Appliance is affected by Cross Site Scripting (XSS). Insecure URI handling leads to bypass security restriction to achieve Cross Site Scripting, which allows an attacker able to execute arbitrary JavaScript codes to perform multiple attacks such as clipboard hijacking and session hijacking.π Read
via "National Vulnerability Database".
β Daxin Espionage Backdoor Ups the Ante on Chinese Malware β
π Read
via "Threat Post".
Via node-hopping, the espionage tool can reach computers that aren't even connected to the internet.π Read
via "Threat Post".
Threat Post
Daxin Espionage Backdoor Ups the Ante on Chinese Malware
Via node-hopping, the espionage tool can reach computers that aren't even connected to the internet.
βΌ CVE-2020-4925 βΌ
π Read
via "National Vulnerability Database".
A security vulnerability in the Spectrum Scale 5.0 and 5.1 allows a non-root user to overflow the mmfsd daemon with requests and preventing the daemon to service other requests. IBM X-Force ID: 191599.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38986 βΌ
π Read
via "National Vulnerability Database".
IBM MQ Appliance 9.2 CD and 9.2 LTS does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 212942.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23387 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in taocms 3.0.2. This is a SQL blind injection that can obtain database data through the Comment Update field.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36166 βΌ
π Read
via "National Vulnerability Database".
An improper authentication vulnerabilityΓ inΓ FortiMail before 7.0.1 may allow a remote attacker to efficiently guess one administrative account's authentication token by means of the observation of certain system's properties.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36171 βΌ
π Read
via "National Vulnerability Database".
The use of a cryptographically weak pseudo-random number generator in the password reset feature of FortiPortal before 6.0.6 may allow a remote unauthenticated attacker to predict parts of or the whole newly generated password within a given time frame.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22321 βΌ
π Read
via "National Vulnerability Database".
IBM MQ Appliance 9.2 CD and 9.2 LTS local messaging users stored with a password hash that provides insufficient protection. IBM X-Force ID: 218368.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38955 βΌ
π Read
via "National Vulnerability Database".
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a local user with elevated privileges to cause a denial of service due to a file creation vulnerability in the audit commands. IBM X-Force ID: 211825.π Read
via "National Vulnerability Database".
βοΈ Conti Ransomware Group Diaries, Part I: Evasion βοΈ
π Read
via "Krebs on Security".
A Ukrainian security researcher this week leaked several years of internal chat logs and other sensitive data tied to Conti, an aggressive and ruthless Russian cybercrime group that focuses on deploying its ransomware to companies with more than $100 million in annual revenue. The chat logs offer a fascinating glimpse into the challenges of running a sprawling criminal enterprise with more than 100 salaried employees. The records also provide insight into how Conti has dealt with its own internal breaches and attacks from private security firms and foreign governments.π Read
via "Krebs on Security".
Krebs on Security
Conti Ransomware Group Diaries, Part I: Evasion
A Ukrainian security researcher this week leaked several years of internal chat logs and other sensitive data tied to Conti, an aggressive and ruthless Russian cybercrime group that focuses on deploying its ransomware to companies with more than $100 millionβ¦
π΄ What Do I Need to Know for SaaS Security? π΄
π Read
via "Dark Reading".
Most importantly, someone needs to step forward and take it on as their job.π Read
via "Dark Reading".
Dark Reading
What Do I Need to Know for SaaS Security?
Most importantly, someone needs to step forward and take it on as their job.
βΌ CVE-2021-43075 βΌ
π Read
via "National Vulnerability Database".
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.2 and below, version 8.5.2 and below, version 8.4.2 and below, version 8.3.2 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to the alarm dashboard and controller config handlers.π Read
via "National Vulnerability Database".