πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-0667 β€Ό

When the vulnerability is triggered the BIND process will exit. BIND 9.18.0

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1036 β€Ό

Able to create an account with long password leads to memory corruption / Integer Overflow in GitHub repository microweber/microweber prior to 1.2.12.

πŸ“– Read

via "National Vulnerability Database".
❌ Serpent Backdoor Slithers into Orgs Using Chocolatey Installer ❌

An unusual attack using an open-source Python package installer called Chocolatey, steganography and Scheduled Tasks is stealthily delivering spyware to companies.

πŸ“– Read

via "Threat Post".
❌ FIDO: Here’s Another Knife to Help Murder Passwords ❌

After years of promising a passwordless future – really, any day now! – FIDO is proposing tweaks to WebAuthn that could put us out of password misery. Experts aren’t so sure.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Scottish mental health charity disrupted by β€˜sophisticated’ cyber-attack πŸ—“οΈ

Organization is β€˜devastated’ over security incident

πŸ“– Read

via "The Daily Swig".
β™ŸοΈ β€˜Spam Nation’ Villain Vrublevsky Charged With Fraud β™ŸοΈ

Pavel Vrublevsky, founder of the Russian payment technology firm ChronoPay and the antagonist in my 2014 book "Spam Nation," was arrested in Moscow this month and charged with fraud. Russian authorities allege Vrublevsky operated several fraudulent SMS-based payment schemes, and facilitated money laundering for Hydra, the largest Russian darknet market. But according to information obtained by KrebsOnSecurity, it is equally likely Vrublevsky was arrested thanks to his propensity for carefully documenting the links between Russia's state security services and the cybercriminal underground.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Zscaler Unveils Security Service Edge Innovations to Protect Enterprises From Cyberattacks πŸ•΄

Advancements to the most deployed ZTNA solution strengthen the Zscaler Zero Trust Exchange with new private app protection, deception, and privileged remote access capabilities.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Checkmarx Launches Comprehensive Supply Chain Security Solution πŸ•΄

Now available for use with Checkmarx Software Composition Analysis (SCA), the solution restores trust in modern application development while letting developers embrace open source code.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Trustero Exits Stealth Mode and Launches its Compliance as a Service Platform πŸ•΄

Proven best practices create integrity and trustworthiness.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Logpoint Unleashes SaaS-Delivered Converged SIEM πŸ•΄

Only solution to deliver integrated cloud-based SIEM, SOAR, and UEBA services directly to organizations of all sizes.

πŸ“– Read

via "Dark Reading".
❌ Russia Lays Groundwork for Cyberattacks on US Infrastructure – White House ❌

"Evolving intelligence" shows Russia amping up for cyber-war in response to Ukraine-related sanctions, the White House said -- but researchers warn that many orgs are not prepared.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Okta investigates LAPSUS$ gang’s compromise claims πŸ—“οΈ

Attackers purportedly said β€˜focus was only on Okta customers’

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-24764 β€Ό

PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43650 β€Ό

WebRun 3.6.0.42 is vulnerable to SQL Injection via the P_0 parameter used to set the username during the login process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24774 β€Ό

CycloneDX BOM Repository Server is a bill of materials (BOM) repository server for distributing CycloneDX BOMs. CycloneDX BOM Repository Server before version 2.0.1 has an improper input validation vulnerability leading to path traversal. A malicious user may potentially exploit this vulnerability to create arbitrary directories or a denial of service by deleting arbitrary directories. The vulnerability is resolved in version 2.0.1. The vulnerability is not exploitable with the default configuration with the post and delete methods disabled. This can be configured by modifying the `appsettings.json` file, or alternatively, setting the environment variables `ALLOWEDMETHODS__POST` and `ALLOWEDMETHODS__DELETE` to `false`.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-25484 β€Ό

tcpprep v4.4.1 has a reachable assertion (assert(l2len > 0)) in packet2tree() at tree.c in tcpprep v4.4.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21718 β€Ό

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to `17.0.0-alpha.6`, `16.0.6`, `15.3.5`, `14.2.4`, and `13.6.6` allows renderers to obtain access to a bluetooth device via the web bluetooth API if the app has not configured a custom `select-bluetooth-device` event handler. This has been patched and Electron versions `17.0.0-alpha.6`, `16.0.6`, `15.3.5`, `14.2.4`, and `13.6.6` contain the fix. Code from the GitHub Security Advisory can be added to the app to work around the issue.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Red Canary's Annual Threat Detection Report Reveals Top Threats and Techniques Targeting Most Organizations πŸ•΄

Report analyzes 30,000 threats in customer environments to uncover the trends, threats and techniques that comprised the 2021 threat landscape.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Ransomware Group Claims Major Okta Breach πŸ•΄

Screenshots that ransomware gang Lapsus$ released this week suggest the threat actor also stole Microsoft source code.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-1031 β€Ό

Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26188 β€Ό

TOTOLINK N600R V4.3.0cu.7570_B20200620 was discovered to contain a command injection vulnerability via /setting/NTPSyncWithHost.

πŸ“– Read

via "National Vulnerability Database".