πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-28440 β€Ό

An arbitrary file upload vulnerability in UCMS v1.6 allows attackers to execute arbitrary code via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28432 β€Ό

Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin.php?id=siteoptions&social=display&value=0&sid=2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28028 β€Ό

Simple Real Estate Portal System v1.0 was discovered to contain a SQL injection vulnerability via /reps/classes/Master.php?f=delete_amenity.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28422 β€Ό

Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&action=edit.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Zero-Day Exploit Use Exploded in 2021 πŸ•΄

Ransomware and other financially motivated threat actors joined nation-state-backed groups in leveraging unpatched flaws in attack campaigns, new data shows.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-29577 β€Ό

OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28366 β€Ό

Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24939.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29280 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-28366. Reason: This candidate is a reservation duplicate of CVE-2022-28366. Notes: All CVE users should reference CVE-2022-28366 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28367 β€Ό

OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1429 β€Ό

SQL injection in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6. This vulnerability is capable of steal the data

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26672 β€Ό

ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26673 β€Ό

ASUS RT-AX88U has insufficient filtering for special characters in the HTTP header parameter. A remote attacker with general user privilege can exploit this vulnerability to inject JavaScript and perform Stored Cross-Site Scripting (XSS) attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26674 β€Ό

ASUS RT-AX88U has a Format String vulnerability, which allows an unauthenticated remote attacker to write to arbitrary memory address and perform remote arbitrary code execution, arbitrary system operation or disrupt service.

πŸ“– Read

via "National Vulnerability Database".
❌ Skeletons in the Closet: Security 101 Takes a Backseat to 0-days ❌

Nate Warfield, CTO at Prevailion, discusses the dangers of focusing on zero-day security vulnerabilities, and how security teams are being distracted from the day-to-day work that prevents most breaches.

πŸ“– Read

via "Threat Post".
πŸ‘1
❌ Zero-Trust For All: A Practical Guide ❌

How to use zero-trust architecture effectively in today's modern cloud-dependent infrastructures.

πŸ“– Read

via "Threat Post".
⚠ S3 Ep79: Chrome hole, a bad place for a cybersecurity holiday, and crypto-dodginess [Podcast] ⚠

Do you know your Adam Osborne from your John Osbourne? Your Z80 from your 6502? Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ‘1
β™ŸοΈ Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code β™ŸοΈ

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects. T-Mobile says no customer or government information was stolen in the intrusion. LAPSUS$ is known for stealing data and then demanding a ransom not to publish or sell it. But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing.

πŸ“– Read

via "Krebs on Security".
πŸ—“οΈ Vulnerability in AWS Log4Shell hot patch allowed full host takeover πŸ—“οΈ

Critical security issues found in quick fix

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Creating Cyberattack Resilience in Modern Education Environments πŸ•΄

From increasing cybersecurity awareness in staff, students, and parents to practicing good security hygiene for devices, using endpoint protection, and inspecting network traffic, schools can boost cybersecurity to keep students safe.

πŸ“– Read

via "Dark Reading".
πŸ›  Zeek 4.2.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ‘1