πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Google: 2021 was a Banner Year for Exploited 0-Day Bugs ❌

Last year, Google Project Zero tracked a record 58 exploited-in-the-wild zero-day security holes.

πŸ“– Read

via "Threat Post".
πŸ•΄ Fortress Tackles Supply Chain Security, One Asset at a Time πŸ•΄

Fortress Information Security will expand its Asset to Vendor Library to include hardware bill of materials and software bill of materials information.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ UK government employees receive β€˜billions’ of malicious emails per year – report πŸ—“οΈ

Phishing, malware, and spam are popular techniques deployed by attackers

πŸ“– Read

via "The Daily Swig".
πŸ•΄ From Passive Recovery to Active Readiness πŸ•΄

This is the shift that companies need to make after a cyberattack.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-1254 β€Ό

A URL redirection vulnerability in Skyhigh SWG in main releases 10.x prior to 10.2.9, 9.x prior to 9.2.20, 8.x prior to 8.2.27, and 7.x prior to 7.8.2.31, and controlled release 11.x prior to 11.1.3 allows a remote attacker to redirect a user to a malicious website controlled by the attacker. This is possible because SWG incorrectly creates a HTTP redirect response when a user clicks a carefully constructed URL. Following the redirect response, the new request is still filtered by the SWG policy.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25344 β€Ό

An XSS issue was discovered on Kyocera d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application doesn't properly check parameters, sent in a /dvcset/sysset/set.cgi POST request via the arg01.Hostname field, before saving them on the server. In addition, the JavaScript malicious content is then reflected back to the end user and executed by the web browser.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25343 β€Ό

An issue was discovered on Kyocera d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application is affected by Denial of Service. An unauthenticated attacker, who can send POST requests to the /download/set.cgi page by manipulating the failhtmfile variable, is able to cause interruption of the service provided by the Web Application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25342 β€Ό

An issue was discovered on Kyocera d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application is affected by Broken Access Control. It does not properly validate requests for access to data and functionality under the /mngset/authset path. By not verifying permissions for access to resources, it allows a potential attacker to view pages that are not allowed.

πŸ“– Read

via "National Vulnerability Database".
⚠ Beanstalk cryptocurrency heist: scammer votes himself all the money ⚠

Voting safeguards based on commuity collateral don't work if one person can use a momentary loan to "become" 75% of the community.

πŸ“– Read

via "Naked Security".
πŸ•΄ Backward-Compatible Post-Quantum Communications Is a Matter of National Security πŸ•΄

When a quantum computer can decipher the asymmetric encryption protecting our vital systems, Q-Day will arrive.

πŸ“– Read

via "Dark Reading".
❌ Most Email Security Approaches Fail to Block Common Threats ❌

A full 89 percent of organizations experienced one or more successful email breaches during the previous 12 months, translating into big-time costs.

πŸ“– Read

via "Threat Post".
⚠ Critical cryptographic Java security blunder patched – update now! ⚠

Either know the private key and use it scrupulously in your digital signature calculation.... or just send a bunch of zeros instead.

πŸ“– Read

via "Naked Security".
πŸ•΄ How Russia Is Isolating Its Own Cybercriminals πŸ•΄

Sanctions imposed by the Biden administration, coupled with Russia's proposed initiative to cut itself off from the global Internet, is causing cybercriminals to ponder their future.

πŸ“– Read

via "Dark Reading".
πŸ” CISA Releases Draft Guidance on SCuBA Cloud Security πŸ”

The program hopes to get agencies on the same page when it comes to implementing security and resilience practices when utilizing cloud services.

πŸ“– Read

via "".
β€Ό CVE-2022-0567 β€Ό

A flaw was found in ovn-kubernetes. This flaw allows a system administrator or privileged attacker to create an egress network policy that bypasses existing ingress policies of other pods in a cluster, allowing network traffic to access pods that should not be reachable. This issue results in information disclosure and other attacks on other pods that should not be reachable.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43933 β€Ό

The affected product is vulnerable to a network-based attack by threat actors sending unimpeded requests to the receiving server, which could cause a denial-of-service condition due to lack of heap memory resources.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43986 β€Ό

The setup program for the affected product configures its files and folders with full access, which may allow unauthorized users permission to replace original binaries and achieve privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26516 β€Ό

Authorized users may install a maliciously modified package file when updating the device via the web user interface. The user may inadvertently use a package file obtained from an unauthorized source or a file that was compromised between download and deployment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38483 β€Ό

The affected product is vulnerable to misconfigured binaries, allowing users on the target PC with SYSTEM level privileges access to overwrite the binary and modify files to gain privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27179 β€Ό

A malicious actor having access to the exported configuration file may obtain the stored credentials and thereby gain access to the protected resource. If the same passwords were used for other resources, further such assets may be compromised.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1039 β€Ό

The weak password on the web user interface can be exploited via HTTP or HTTPS. Once such access has been obtained, the other passwords can be changed. The weak password on Linux accounts can be accessed via SSH or Telnet, the former of which is by default enabled on trusted interfaces. While the SSH service does not support root login, a user logging in using either of the other Linux accounts may elevate to root access using the su command if they have access to the associated password.

πŸ“– Read

via "National Vulnerability Database".