ποΈ Volatile market for stolen credit card data shaken up by sanctions against Russia ποΈ
π Read
via "The Daily Swig".
Illicit trade still flourishing despite recent law enforcement takedownsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Volatile market for stolen credit card data shaken up by sanctions against Russia
Illicit trade still flourishing despite recent law enforcement takedowns
βΌ CVE-2021-32989 βΌ
π Read
via "National Vulnerability Database".
When a non-existent resource is requested, the LCDS LAquis SCADA application (version 4.3.1.1011 and prior) returns error messages which may allow reflected cross-site scripting.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29380 βΌ
π Read
via "National Vulnerability Database".
Academy-LMS v4.3 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the SEO panel.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1678 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32966 βΌ
π Read
via "National Vulnerability Database".
Philips Interoperability Solution XDS versions 2.5 through 3.11 and 2018-1 through 2021-1 are vulnerable to clear text transmission of sensitive information when configured to use LDAP via TLS and where the domain controller returns LDAP referrals, which may allow an attacker to remotely read LDAP system credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32997 βΌ
π Read
via "National Vulnerability Database".
The affected Baker Hughes Bentley Nevada products (3500 System 1 6.x, Part No. 3060/00 versions 6.98 and prior, 3500 System 1, Part No. 3071/xx & 3072/xx versions 21.1 HF1 and prior, 3500 Rack Configuration, Part No. 129133-01 versions 6.4 and prior, and 3500/22M Firmware, Part No. 288055-01 versions 5.05 and prior) utilize a weak encryption algorithm for storage and transmission of sensitive data, which may allow an attacker to more easily obtain credentials used for access.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22127 βΌ
π Read
via "National Vulnerability Database".
Tableau is aware of a broken access control vulnerability present in Tableau Server affecting Tableau Server customers using Local Identity Store for managing users. The vulnerability allows a malicious site administrator to change passwords for users in different sites hosted on the same Tableau Server, resulting in the potential for unauthorized access to data.Tableau Server versions affected are:2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 and earlierNote: All future releases of Tableau Server will address this security issue. Versions that are no longer supported are not tested and may be vulnerable.π Read
via "National Vulnerability Database".
βΌ CVE-2021-35487 βΌ
π Read
via "National Vulnerability Database".
Nokia Broadcast Message Center through 11.1.0 allows an authenticated user to perform a Boolean Blind SQL Injection attack on the endpoint /owui/block/send-receive-updates (for the Manage Alerts page) via the extIdentifier HTTP POST parameter. This allows an attacker to obtain the database user, database name, and database version information, and potentially database data.π Read
via "National Vulnerability Database".
π΄ Spring Cleaning Checklist for Keeping Your Devices Safe at Work π΄
π Read
via "Dark Reading".
Implement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and employees' devices secure.π Read
via "Dark Reading".
Dark Reading
Spring Cleaning Checklist for Keeping Your Devices Safe at Work
Implement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and employees' devices secure.
π΄ CLOP Ransomware Activity Spiked in April π΄
π Read
via "Dark Reading".
In just one month, the ransomware group's activity rose by 2,100%, a new report finds.π Read
via "Dark Reading".
Dark Reading
CLOP Ransomware Activity Spiked in April
In just one month, the ransomware group's activity rose by 2,100%, a new report finds.
π΄ Brexit Leak Site Linked to Russian Hackers π΄
π Read
via "Dark Reading".
Purporting to publish leaked emails of pro-Brexit leadership in the UK, a new site's operations have been traced to Russian cyber-threat actors, Google says.π Read
via "Dark Reading".
Dark Reading
Brexit Leak Site Linked to Russian Hackers
Purporting to publish leaked emails of pro-Brexit leadership in the UK, a new site's operations have been traced to Russian cyber-threat actors, Google says.
π΄ Meet the 10 Finalists in the RSA Conference Innovation Sandbox π΄
π Read
via "Dark Reading".
This year's finalists tackle such vital security concerns as permissions management, software supply chain vulnerability, and data governance. Winners will be announced June 6.π Read
via "Dark Reading".
Dark Reading
Meet the 10 Finalists in the RSA Conference Innovation Sandbox
This year's finalists tackle such vital security concerns as permissions management, software supply chain vulnerability, and data governance. Winners will be announced June 6.
π΄ Corelight Announces New SaaS Platform for Threat Hunting π΄
π Read
via "Dark Reading".
Corelight Investigator aids threat hunting and investigation through intelligent alert aggregation, built-in queries and scalable searchπ Read
via "Dark Reading".
Dark Reading
Corelight Announces New SaaS Platform for Threat Hunting
Corelight Investigator aids threat hunting and investigation through intelligent alert aggregation, built-in queries and scalable search
π΄ Mastercard Launches Cybersecurity βExperience Centreβ π΄
π Read
via "Dark Reading".
Experience Centre features emerging Mastercard products and solutions for securing digital payments on a global scale, including those developed locally in Vancouver.π Read
via "Dark Reading".
Dark Reading
Mastercard Launches Cybersecurity βExperience Centreβ
Experience Centre features emerging Mastercard products and solutions for securing digital payments on a global scale, including those developed locally in Vancouver.
π΄ Qualys to Unveil VMDR 2.0 at Qualys Security Conference in San Francisco π΄
π Read
via "Dark Reading".
Company will detail enhancements to Vulnerability Management, Detection and Response solution next month.π Read
via "Dark Reading".
Dark Reading
Qualys to Unveil VMDR 2.0 at Qualys Security Conference in San Francisco
Company will detail enhancements to Vulnerability Management, Detection and Response solution next month.
π΄ Cybersecurity-Focused SYN Ventures Closes $300 Million Fund II π΄
π Read
via "Dark Reading".
Cylance co-founder Ryan Permeh has joined full time as an operating partner.π Read
via "Dark Reading".
Dark Reading
Cybersecurity-Focused SYN Ventures Closes $300 Million Fund II
Cylance co-founder Ryan Permeh has joined full time as an operating partner.
π΄ Vishing Attacks Reach All Time High, According to Latest Agari and PhishLabs Report π΄
π Read
via "Dark Reading".
According to the findings, vishing attacks have overtaken business email compromise as the second most reported response-based email threat since Q3 2021.π Read
via "Dark Reading".
Dark Reading
Vishing Attacks Reach All Time High, According to Latest Agari and PhishLabs Report
According to the findings, vishing attacks have overtaken business email compromise as the second most reported response-based email threat since Q3 2021.
π΄ Zero-Click Zoom Bug Allows Code Execution Just by Sending a Message π΄
π Read
via "Dark Reading".
Google has disclosed a nasty set of six bugs affecting Zoom chat that can be chained together for MitM and RCE attacks, no user interaction required.π Read
via "Dark Reading".
Dark Reading
Zero-Click Zoom Bug Allows Code Execution Just by Sending a Message
Google has disclosed a nasty set of six bugs affecting Zoom chat that can be chained together for MitM and RCE attacks, no user interaction required.
π΄ JFrog Launches Project Pyrsia to Help Prevent Software Supply Chain Attacks π΄
π Read
via "Dark Reading".
Open source software community initiative utilizes blockchain technology.π Read
via "Dark Reading".
Dark Reading
JFrog Launches Project Pyrsia to Help Prevent Software Supply Chain Attacks
Open source software community initiative utilizes blockchain technology.
π΄ Interpol's Massive 'Operation Delilah' Nabs BEC Bigwig π΄
π Read
via "Dark Reading".
A sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.π Read
via "Dark Reading".
Dark Reading
Interpol's Massive 'Operation Delilah' Nabs BEC Bigwig
A sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.
βΌ CVE-2022-29402 βΌ
π Read
via "National Vulnerability Database".
TP-Link TL-WR840N EU v6.20 was discovered to contain insecure protections for its UART console. This vulnerability allows attackers to connect to the UART port via a serial connection and execute commands as the root user without authentication.π Read
via "National Vulnerability Database".