π΄ Interpol's Massive 'Operation Delilah' Nabs BEC Bigwig π΄
π Read
via "Dark Reading".
A sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.π Read
via "Dark Reading".
Dark Reading
Interpol's Massive 'Operation Delilah' Nabs BEC Bigwig
A sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.
βΌ CVE-2022-29402 βΌ
π Read
via "National Vulnerability Database".
TP-Link TL-WR840N EU v6.20 was discovered to contain insecure protections for its UART console. This vulnerability allows attackers to connect to the UART port via a serial connection and execute commands as the root user without authentication.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29248 βΌ
π Read
via "National Vulnerability Database".
Guzzle is a PHP HTTP client. Guzzle prior to versions 6.5.6 and 7.4.3 contains a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the Set-Cookie header, allowing a malicious server to set cookies for unrelated domains. The cookie middleware is disabled by default, so most library consumers will not be affected by this issue. Only those who manually add the cookie middleware to the handler stack or construct the client with ['cookies' => true] are affected. Moreover, those who do not use the same Guzzle client to call multiple domains and have disabled redirect forwarding are not affected by this vulnerability. Guzzle versions 6.5.6 and 7.4.3 contain a patch for this issue. As a workaround, turn off the cookie middleware.π Read
via "National Vulnerability Database".
π Insider Threats Responsible for 68% of UK Legal Sector Data Breaches π
π Read
via "".
Data analyzed this week highlights the percentage of data breaches carried out by insiders at law firms in the U.K.π Read
via "".
π΄ Is Your Data Security Living on the Edge? π΄
π Read
via "Dark Reading".
Gartner's security service edge fundamentally changes how companies should be delivering data protection in a cloud and mobile first world.π Read
via "Dark Reading".
Dark Reading
Is Your Data Security Living on the Edge?
Gartner's security service edge fundamentally changes how companies should be delivering data protection in a cloud and mobile first world.
π΄ Forescout Launches Forescout Frontline to Help Organizations Tackle Ransomware and Real Time Threats π΄
π Read
via "Dark Reading".
New threat hunting and risk identification service provides organizations with an enterprise-wide baseline of their threat landscape and risk exposure.π Read
via "Dark Reading".
Dark Reading
Forescout Launches Forescout Frontline to Help Organizations Tackle Ransomware and Real Time Threats
New threat hunting and risk identification service provides organizations with an enterprise-wide baseline of their threat landscape and risk exposure.
βΌ CVE-2022-29256 βΌ
π Read
via "National Vulnerability Database".
sharp is an application for Node.js image processing. Prior to version 0.30.5, there is a possible vulnerability in logic that is run only at `npm install` time when installing versions of `sharp` prior to the latest v0.30.5. If an attacker has the ability to set the value of the `PKG_CONFIG_PATH` environment variable in a build environment then they might be able to use this to inject an arbitrary command at `npm install` time. This is not part of any runtime code, does not affect Windows users at all, and is unlikely to affect anyone that already cares about the security of their build environment. This problem is fixed in version 0.30.5.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31651 βΌ
π Read
via "National Vulnerability Database".
In SoX 14.4.2, there is an assertion failure in rate_init in rate.c in libsox.a.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31650 βΌ
π Read
via "National Vulnerability Database".
In SoX 14.4.2, there is a floating-point exception in lsx_aiffstartwrite in aiff.c in libsox.a.π Read
via "National Vulnerability Database".
π’ Open source packages with millions of installs hacked to harvest AWS credentials π’
π Read
via "ITPro".
Two popular open source packages used by Python and PHP developers have been quietly compromised with successful attacks already being reportedπ Read
via "ITPro".
IT PRO
Open source packages with millions of installs hacked to harvest AWS credentials | IT PRO
Two popular open source packages used by Python and PHP developers have been quietly compromised with successful attacks already being reported
π’ DOE βββββββββββββββfundsβ βdevelopment of Qunnect's Quantum Repeater π’
π Read
via "ITPro".
The $1.85 million grant will eventually pave the way for quantum internetπ Read
via "ITPro".
IT PRO
DOE βββββββββββββββfundsβ βdevelopment of Qunnect's Quantum Repeater | IT PRO
The $1.85 million grant will eventually pave the way for quantum internet
β Cybergang Claims REvil is Back, Executes DDoS Attacks β
π Read
via "Threat Post".
Actors claiming to be the defunct ransomware group are targeting one of Akamiβs customers with a Layer 7 attack, demanding an extortion payment in Bitcoin.π Read
via "Threat Post".
Threat Post
Cybergang Claims REvil is Back, Executes DDoS Attacks
Actors claiming to be the defunct ransomware group are targeting one of Akamiβs customers with a Layer 7 attack, demanding an extortion payment in Bitcoin.
β Poisoned Python and PHP packages purloin passwords for AWS access β
π Read
via "Naked Security".
More supply chain trouble - this time with clear examples so you can learn how to spot this stuff yourself.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
βΌ CVE-2021-42692 βΌ
π Read
via "National Vulnerability Database".
There is a stack-overflow vulnerability in tinytoml v0.4 that can cause a crash or DoS.π Read
via "National Vulnerability Database".
π΄ Most Common Threats in DBIR π΄
π Read
via "Dark Reading".
Supply chain and ransomware attacks increased dramatically this year, which explains why so many data breaches in this year's DBIR were grouped as system intrusion.π Read
via "Dark Reading".
Dark Reading
Most Common Threats in DBIR
Supply chain and ransomware attacks increased dramatically in 2021, which explains why so many data breaches in Verizon's "2022 Data Breach Investigations Report" were grouped as system intrusion.
β Whoβs watching your webcam? The Screencastify Chrome extension storyβ¦ β
π Read
via "Naked Security".
When you really need to make exceptions in cybersecurity, specify them as explicitly as you can.π Read
via "Naked Security".
Naked Security
Whoβs watching your webcam? The Screencastify Chrome extension storyβ¦
When you really need to make exceptions in cybersecurity, specify them as explicitly as you can.
βΌ CVE-2022-29720 βΌ
π Read
via "National Vulnerability Database".
74cmsSE v3.5.1 was discovered to contain an arbitrary file read vulnerability via the component \index\controller\Download.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40317 βΌ
π Read
via "National Vulnerability Database".
Piwigo 11.5.0 is affected by a SQL injection vulnerability via admin.php and the id parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42859 βΌ
π Read
via "National Vulnerability Database".
A memory leak issue was discovered in Mini-XML v3.2 that could cause a denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29721 βΌ
π Read
via "National Vulnerability Database".
74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/jobfairol/resumelist.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42860 βΌ
π Read
via "National Vulnerability Database".
A stack buffer overflow exists in Mini-XML v3.2. When inputting an unformed XML string to the mxmlLoadString API, it will cause a stack-buffer-overflow in mxml_string_getc:2611.π Read
via "National Vulnerability Database".