πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-29897 β€Ό

On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the traceroute utility integrated in the WebUI to execute arbitrary code with root privileges on the OS due to an improper input validation in all versions of the firmware.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29978 β€Ό

There is a floating point exception error in sixel_encoder_do_resize, encoder.c:633 in libsixel img2sixel 1.8.6. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted JPEG file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29007 β€Ό

Multiple SQL injection vulnerabilities via the username and password parameters in the Admin panel of Dairy Farm Shop Management System v1.0 allows attackers to bypass authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29613 β€Ό

Due to insufficient input validation, SAP Employee Self Service allows an authenticated attacker with user privileges to alter employee number. On successful exploitation, the attacker can view personal details of other users causing a limited impact on confidentiality of the application.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Quantum Ransomware Strikes Quickly, How to Prepare and Recover πŸ•΄

NYC-area cybersecurity expert shares the anatomy of a Quantum Ransomware attack and how to prevent, detect and recover from a ransomware attack, in a new article from eMazzanti Technologies.

πŸ“– Read

via "Dark Reading".
πŸ›  Samhain File Integrity Checker 4.4.9 πŸ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Aircrack-ng Wireless Network Tools 1.7 πŸ› 

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Top 6 Security Threats Targeting Remote Workers πŸ•΄

Remote work is here to stay, which means security teams must ensure that security extends beyond corporate devices and protects employees wherever they are.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Breaking Down the Strengthening American Cybersecurity Act πŸ•΄

New federal cybersecurity rules will set timelines for critical infrastructure sector organizations β€” those in chemical, manufacturing, healthcare, defense contracting, energy, financial, nuclear, or transportation β€” to report ransomware payments and cyberattacks to CISA. All parties have to comply for it to work and help protect assets.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Concentric AI Raises Series A Funding Led by Ballistic Ventures to Autonomously Secure Business-Critical Data πŸ•΄

Round of $14.5M to support team of AI experts and cybersecurity leaders targeting overshared data with AI-based solutions for data access governance and loss prevention.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Keeper Security Partners with SHI International for New Fully Managed IT Service (SHI Complete) πŸ•΄

The partnership integrates Keeper's zero-knowledge, zero-trust enterprise password manager (EPM) into SHI Complete, a comprehensive, fully managed IT service for small and medium-sized businesses (SMBs).

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-26339 β€Ό

A bug in AMD CPUÒ€ℒs core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39059 β€Ό

IBM Jazz Foundation (IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 214619.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26364 β€Ό

Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26348 β€Ό

Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26350 β€Ό

A TOCTOU race condition in SMU may allow for the caller to obtain and manipulate the address of a message port register which may result in a potential denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26378 β€Ό

Insufficient bound checks in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0027 β€Ό

An improper authorization vulnerability in Palo Alto Network Cortex XSOAR software enables authenticated users in non-Read-Only groups to generate an email report that contains summary information about all incidents in the Cortex XSOAR instance, including incidents to which the user does not have access. This issue impacts: All versions of Cortex XSOAR 6.1; All versions of Cortex XSOAR 6.2; All versions of Cortex XSOAR 6.5; Cortex XSOAR 6.6 versions earlier than Cortex XSOAR 6.6.0 build 6.6.0.2585049.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0026 β€Ό

A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29616 β€Ό

SAP Host Agent, SAP NetWeaver and ABAP Platform allow an attacker to leverage logical errors in memory management to cause a memory corruption.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26342 β€Ό

In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability.

πŸ“– Read

via "National Vulnerability Database".