π΄ EnemyBot Puts Enterprises in the Crosshairs With Raft of '1-Day' Bugs π΄
π Read
via "Dark Reading".
EnemyBot DDoS botnet is rapidly weaponizing security bugs disclosed in CMS systems like WordPress plug-ins, Android devices, commercial Web servers, and other enterprise applications.π Read
via "Dark Reading".
Dark Reading
EnemyBot Puts Enterprises in the Crosshairs With Raft of '1-Day' Bugs
EnemyBot DDoS botnet is rapidly weaponizing security bugs disclosed in CMS systems like WordPress plug-ins, Android devices, commercial Web servers, and other enterprise applications.
π΄ Netskope Acquires WootCloud, Extending Zero Trust Capabilities to Enterprise IoT π΄
π Read
via "Dark Reading".
Contextual Intelligence derived with machine learning helps customers identify, assess and remediate threats from IoT devices on their networks, achieving full visibility and control.π Read
via "Dark Reading".
Dark Reading
Netskope Acquires WootCloud, Extending Zero Trust Capabilities to Enterprise IoT
Contextual Intelligence derived with machine learning helps customers identify, assess and remediate threats from IoT devices on their networks, achieving full visibility and control.
π΄ Lookout Acquires SaferPass To Address The Rising Threat Of Identity Theft π΄
π Read
via "Dark Reading".
Password management solution delivers proactive, seamless approach to protecting privacy and login credentials for consumers and businesses; Password Management market expected to reach $3 billion by 2026.π Read
via "Dark Reading".
Dark Reading
Lookout Acquires SaferPass To Address The Rising Threat Of Identity Theft
Password management solution delivers proactive, seamless approach to protecting privacy and login credentials for consumers and businesses; Password Management market expected to reach $3 billion by 2026.
π΄ ReliaQuest to Acquire Digital Shadows π΄
π Read
via "Dark Reading".
Combined company creates world-class security operations platform to offer customers unmatched visibility and detection to defend against threats.π Read
via "Dark Reading".
Dark Reading
ReliaQuest to Acquire Digital Shadows
Combined company creates world-class security operations platform to offer customers unmatched visibility and detection to defend against threats.
π΄ NetSPI's New Breach and Attack Simulation Enhancements Help Organizations Achieve Behavior-Based Threat Detection π΄
π Read
via "Dark Reading".
Organizations leverage the platform-driven, human-delivered service to measure and continuously improve the efficacy of detective controls and MSSP coverage.π Read
via "Dark Reading".
Dark Reading
NetSPI's New Breach and Attack Simulation Enhancements Help Organizations Achieve Behavior-Based Threat Detection
Organizations leverage the platform-driven, human-delivered service to measure and continuously improve the efficacy of detective controls and MSSP coverage.
π΄ Netenrich Debuts Resolution Intelligence Secure Digital Operations Platform at RSA 2022 π΄
π Read
via "Dark Reading".
New operational analytics and AI/ML platform drives contextual intelligence and prioritized actions to anticipate risky behaviors, disrupt threats and insure business resilience.π Read
via "Dark Reading".
Dark Reading
Netenrich Debuts Resolution Intelligence Secure Digital Operations Platform at RSA 2022
New operational analytics and AI/ML platform drives contextual intelligence and prioritized actions to anticipate risky behaviors, disrupt threats and insure business resilience.
π΄ Feds Seize Domains Dealing Stolen Personal Data π΄
π Read
via "Dark Reading".
WeLeakInfo.to and two related domains let users search data stolen in more than 10,000 different breaches.π Read
via "Dark Reading".
Dark Reading
Feds Seize Domains Dealing Stolen Personal Data
WeLeakInfo.to and two related domains let users search data stolen in more than 10,000 different breaches.
π΄ Darktrace's David Masson on What Attacks on Critical Infrastructure Look Like π΄
π Read
via "Dark Reading".
In this Tech Talk, Darktrace's David Masson and Dark Reading's Terry Sweeney discuss the rise of destructive attacks against critical infrastructure.π Read
via "Dark Reading".
Darkreading
Darktrace's David Masson on What Attacks on Critical Infrastructure Look Like
In this Tech Talk, Darktrace's David Masson and Dark Reading's Terry Sweeney discuss the rise of destructive attacks against critical infrastructure.
π΄ 12K Misconfigured Elasticsearch Buckets Ravaged by Extortionists π΄
π Read
via "Dark Reading".
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.π Read
via "Dark Reading".
Dark Reading
12K Misconfigured Elasticsearch Buckets Ravaged by Extortionists
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.
π΄ Hunting for Threats Using Network Traffic Flows π΄
π Read
via "Dark Reading".
SeclarityIO's NetworkSage platform analyzes network traffic data to identify attacks before they become real problems.π Read
via "Dark Reading".
Dark Reading
Hunting for Threats Using Network Traffic Flows
SeclarityIO's NetworkSage platform analyzes network traffic data to identify attacks before they become real problems.
π΄ FluBot Android Malware Operation Disrupted, Infrastructure Seized π΄
π Read
via "Dark Reading".
Security researchers have described the malware as among the fastest-spreading mobile threats in recent years.π Read
via "Dark Reading".
Dark Reading
FluBot Android Malware Operation Disrupted, Infrastructure Seized
Security researchers have described the malware as among the fastest-spreading mobile threats in recent years.
βΌ CVE-2022-30128 βΌ
π Read
via "National Vulnerability Database".
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30127.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-30190 βΌ
π Read
via "National Vulnerability Database".
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30127 βΌ
π Read
via "National Vulnerability Database".
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30128.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31022 βΌ
π Read
via "National Vulnerability Database".
Bleve is a text indexing library for go. Bleve includes HTTP utilities under bleve/http package, that are used by its sample application. These HTTP methods pave way for exploitation of a nodeΓΒ’Γ’β¬ÒβΒ’s filesystem where the bleve index resides, if the user has used bleveΓΒ’Γ’β¬ÒβΒ’s own HTTP (bleve/http) handlers for exposing the access to the indexes. For instance, the CreateIndexHandler (`http/index_create.go`) and DeleteIndexHandler (`http/index_delete.go`) enable an attacker to create a bleve index (directory structure) anywhere where the user running the server has the write permissions and to delete recursively any directory owned by the same user account. Users who have used the bleve/http package for exposing access to bleve index without the explicit handling for the Role Based Access Controls(RBAC) of the index assets would be impacted by this issue. There is no patch for this issue because the http package is purely intended to be used for demonstration purposes. Bleve was never designed handle the RBACs, nor it was ever advertised to be used in that way. The collaborators of this project have decided to stay away from adding any authentication or authorization to bleve project at the moment. The bleve/http package is mainly for demonstration purposes and it lacks exhaustive validation of the user inputs as well as any authentication and authorization measures. It is recommended to not use bleve/http in production use cases.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26905 βΌ
π Read
via "National Vulnerability Database".
Microsoft Edge (Chromium-based) Spoofing Vulnerability.π Read
via "National Vulnerability Database".
π΄ Darktrace's Brianna Leddy on How Ransomware Groups Adapt to New Defenses π΄
π Read
via "Dark Reading".
In this Tech Talk, Darktrace's Brianna Leddy and Dark Reading's Terry Sweeney discuss ways ransomware groups adapt their activities as enterprise security teams evolve their defenses and controls.π Read
via "Dark Reading".
Darkreading
Darktrace's Brianna Leddy on How Ransomware Groups Adapt to New Defenses
In this Tech Talk, Darktrace's Brianna Leddy and Dark Reading's Terry Sweeney discuss ways ransomware groups adapt their activities as enterprise security teams evolve their defenses and controls.
π΄ Managing Extended Software Supply Chain Risks π΄
π Read
via "Dark Reading".
Supply chain woes have dominated headlines, but there's another type of supply chain that's also increasingly at risk: the cloud supply chain.π Read
via "Dark Reading".
Dark Reading
Managing Extended Software Supply Chain Risks
Supply chain woes have dominated headlines, but there's another type of supply chain that's also increasingly at risk: the cloud supply chain.
βΌ CVE-2022-29235 βΌ
π Read
via "National Vulnerability Database".
BigBlueButton is an open source web conferencing system. Starting in version 2.2 and up to versions 2.3.18 and 2.4-rc-6, an attacker who is able to obtain the meeting identifier for a meeting on a server can find information related to an external video being shared, like the current timestamp and play/pause. The problem has been patched in versions 2.3.18 and 2.4-rc-6 by modifying the stream to send the data only for users in the meeting. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29234 βΌ
π Read
via "National Vulnerability Database".
BigBlueButton is an open source web conferencing system. Starting in version 2.2 and up to versions 2.3.18 and 2.4.1, an attacker could send messages to a locked chat within a grace period of 5s after the lock setting was enacted. The attacker needs to be a participant in the meeting. Versions 2.3.18 and 2.4.1 contain a patch for this issue. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29233 βΌ
π Read
via "National Vulnerability Database".
BigBlueButton is an open source web conferencing system. In BigBlueButton starting with 2.2 but before 2.3.18 and 2.4-rc-1, an attacker can circumvent access controls to gain access to all breakout rooms of the meeting they are in. The permission checks rely on knowledge of internal ids rather than on verification of the role of the user. Versions 2.3.18 and 2.4-rc-1 contain a patch for this issue. There are currently no known workarounds.π Read
via "National Vulnerability Database".