πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  Samhain File Integrity Checker 4.4.9 πŸ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Aircrack-ng Wireless Network Tools 1.7 πŸ› 

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Top 6 Security Threats Targeting Remote Workers πŸ•΄

Remote work is here to stay, which means security teams must ensure that security extends beyond corporate devices and protects employees wherever they are.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Breaking Down the Strengthening American Cybersecurity Act πŸ•΄

New federal cybersecurity rules will set timelines for critical infrastructure sector organizations β€” those in chemical, manufacturing, healthcare, defense contracting, energy, financial, nuclear, or transportation β€” to report ransomware payments and cyberattacks to CISA. All parties have to comply for it to work and help protect assets.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Concentric AI Raises Series A Funding Led by Ballistic Ventures to Autonomously Secure Business-Critical Data πŸ•΄

Round of $14.5M to support team of AI experts and cybersecurity leaders targeting overshared data with AI-based solutions for data access governance and loss prevention.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Keeper Security Partners with SHI International for New Fully Managed IT Service (SHI Complete) πŸ•΄

The partnership integrates Keeper's zero-knowledge, zero-trust enterprise password manager (EPM) into SHI Complete, a comprehensive, fully managed IT service for small and medium-sized businesses (SMBs).

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-26339 β€Ό

A bug in AMD CPUÒ€ℒs core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39059 β€Ό

IBM Jazz Foundation (IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 214619.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26364 β€Ό

Insufficient bounds checking in an SMU mailbox register could allow an attacker to potentially read outside of the SRAM address range which could result in an exception handling leading to a potential denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26348 β€Ό

Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26350 β€Ό

A TOCTOU race condition in SMU may allow for the caller to obtain and manipulate the address of a message port register which may result in a potential denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26378 β€Ό

Insufficient bound checks in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0027 β€Ό

An improper authorization vulnerability in Palo Alto Network Cortex XSOAR software enables authenticated users in non-Read-Only groups to generate an email report that contains summary information about all incidents in the Cortex XSOAR instance, including incidents to which the user does not have access. This issue impacts: All versions of Cortex XSOAR 6.1; All versions of Cortex XSOAR 6.2; All versions of Cortex XSOAR 6.5; Cortex XSOAR 6.6 versions earlier than Cortex XSOAR 6.6.0 build 6.6.0.2585049.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0026 β€Ό

A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29616 β€Ό

SAP Host Agent, SAP NetWeaver and ABAP Platform allow an attacker to leverage logical errors in memory management to cause a memory corruption.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26342 β€Ό

In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26376 β€Ό

Insufficient checks in System Management Unit (SMU) FeatureConfig may result in reenabling features potentially resulting in denial of resources and/or denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46744 β€Ό

An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26372 β€Ό

Insufficient bound checks related to PCIE in the System Management Unit (SMU) may result in access to an invalid address space that could result in denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3611 β€Ό

A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0024 β€Ό

A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated network-based PAN-OS administrator to upload a specifically created configuration that disrupts system processes and potentially execute arbitrary code with root privileges when the configuration is committed on both hardware and virtual firewalls. This issue does not impact Panorama appliances or Prisma Access customers. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.23; PAN-OS 9.0 versions earlier than PAN-OS 9.0.16; PAN-OS 9.1 versions earlier than PAN-OS 9.1.13; PAN-OS 10.0 versions earlier than PAN-OS 10.0.10; PAN-OS 10.1 versions earlier than PAN-OS 10.1.5.

πŸ“– Read

via "National Vulnerability Database".