πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Google Blows Lid Off Conti, Diavol Ransomware Access-Broker Ops ❌

Researchers have exposed the work of Exotic Lily, a full-time cybercriminal initial-access group that uses phishing to infiltrate organizations’ networks for further malicious activity.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Workaround offered for unpatched HTML-to-PDF rendering vulnerability πŸ—“οΈ

Security flaws exposed in popular dompdf PHP library

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2022-24772 β€Ό

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-24771 β€Ό

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24773 β€Ό

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ•΄ Satellite Networks Worldwide at Risk of Possible Cyberattacks, FBI & CISA Warn πŸ•΄

Agencies provide mitigation steps to protect satellite communication (SATCOM) networks amid "current geopolitical situation."

πŸ“– Read

via "Dark Reading".
❌ Sandworm APT Hunts for ASUS Routers with Cyclops Blink Botnet ❌

The Russian-speaking APT behind the NotPetya attacks and the Ukrainian power grid takedown could be setting up for additional sinister attacks, researchers said.

πŸ“– Read

via "Threat Post".
⚠ S3 Ep74: Cybercrime busts, Apple patches, Pi Day, and disconnect effects [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-24637 β€Ό

Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2021-39046 β€Ό

IBM Business Automation Workflow 18.0, 19.0, 20.0, and 21.0 and IBM Business Process Manager 8.5 and 8.6 stores user credentials in plain clear text which can be read by a lprivileged user. IBM X-Force ID: 214346.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29899 β€Ό

IBM Engineering Requirements Quality Assistant prior to 3.1.3 could allow an authenticated user to cause a denial of service. IBM X-Force ID: 207413.

πŸ“– Read

via "National Vulnerability Database".
⚠ OpenSSL patches infinite-loop DoS bug in certificate verification ⚠

When it comes to writing loops in your code... never sit on the fence!

πŸ“– Read

via "Naked Security".
πŸ” Friday Five 3/18 πŸ”

How HIPAA can help mitigate cyberattacks, killing the password, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
πŸ•΄ Security Teams Struggle to Get Started With Zero Trust πŸ•΄

Nearly a third of respondents in a Dark Reading survey on endpoint security strategy say zero trust is too confusing to implement.

πŸ“– Read

via "Dark Reading".
❌ DarkHotel APT Targets Wynn, Macao Hotels to Rip Off Guest Data ❌

A DarkHotel phishing campaign breached luxe hotel networks, including Wynn Palace and the Grand Coloane Resort in Macao, a new report says.

πŸ“– Read

via "Threat Post".
πŸ•΄ Menlo Security: Less Than Three in 10 Organizations Are Equipped to Combat Growing Wave of Web-Based Cyber Threats πŸ•΄

Report finds that 62 percent of IT decision makers have suffered a browser-based attack in the past 12 months.

πŸ“– Read

via "Dark Reading".
πŸ•΄ A Chance to Raise Shields Right πŸ•΄

CISA's "Shields Up" alert provides urgency β€” and opportunity β€” for supply chain conversations.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CyCognito Launches Exploit Intelligence πŸ•΄

Risk intelligence solution provides insight, visibility, and guidance to identify, prioritize, and remediate vulnerabilities like Log4j

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-22611 β€Ό

An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, iTunes 12.12.3 for Windows, watchOS 8.5, macOS Monterey 12.3. Processing a maliciously crafted image may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22617 β€Ό

A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. An application may be able to gain elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22656 β€Ό

An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. A local attacker may be able to view the previous logged in userÒ€ℒs desktop from the fast user switching screen.

πŸ“– Read

via "National Vulnerability Database".