πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Netenrich Debuts Resolution Intelligence Secure Digital Operations Platform at RSA 2022 πŸ•΄

New operational analytics and AI/ML platform drives contextual intelligence and prioritized actions to anticipate risky behaviors, disrupt threats and insure business resilience.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Feds Seize Domains Dealing Stolen Personal Data πŸ•΄

WeLeakInfo.to and two related domains let users search data stolen in more than 10,000 different breaches.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Darktrace's David Masson on What Attacks on Critical Infrastructure Look Like πŸ•΄

In this Tech Talk, Darktrace's David Masson and Dark Reading's Terry Sweeney discuss the rise of destructive attacks against critical infrastructure.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 12K Misconfigured Elasticsearch Buckets Ravaged by Extortionists πŸ•΄

The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Hunting for Threats Using Network Traffic Flows πŸ•΄

SeclarityIO's NetworkSage platform analyzes network traffic data to identify attacks before they become real problems.

πŸ“– Read

via "Dark Reading".
πŸ•΄ FluBot Android Malware Operation Disrupted, Infrastructure Seized πŸ•΄

Security researchers have described the malware as among the fastest-spreading mobile threats in recent years.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-30128 β€Ό

Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30127.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-30190 β€Ό

Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30127 β€Ό

Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30128.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31022 β€Ό

Bleve is a text indexing library for go. Bleve includes HTTP utilities under bleve/http package, that are used by its sample application. These HTTP methods pave way for exploitation of a nodeΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s filesystem where the bleve index resides, if the user has used bleveΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s own HTTP (bleve/http) handlers for exposing the access to the indexes. For instance, the CreateIndexHandler (`http/index_create.go`) and DeleteIndexHandler (`http/index_delete.go`) enable an attacker to create a bleve index (directory structure) anywhere where the user running the server has the write permissions and to delete recursively any directory owned by the same user account. Users who have used the bleve/http package for exposing access to bleve index without the explicit handling for the Role Based Access Controls(RBAC) of the index assets would be impacted by this issue. There is no patch for this issue because the http package is purely intended to be used for demonstration purposes. Bleve was never designed handle the RBACs, nor it was ever advertised to be used in that way. The collaborators of this project have decided to stay away from adding any authentication or authorization to bleve project at the moment. The bleve/http package is mainly for demonstration purposes and it lacks exhaustive validation of the user inputs as well as any authentication and authorization measures. It is recommended to not use bleve/http in production use cases.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26905 β€Ό

Microsoft Edge (Chromium-based) Spoofing Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Darktrace's Brianna Leddy on How Ransomware Groups Adapt to New Defenses πŸ•΄

In this Tech Talk, Darktrace's Brianna Leddy and Dark Reading's Terry Sweeney discuss ways ransomware groups adapt their activities as enterprise security teams evolve their defenses and controls.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Managing Extended Software Supply Chain Risks πŸ•΄

Supply chain woes have dominated headlines, but there's another type of supply chain that's also increasingly at risk: the cloud supply chain.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-29235 β€Ό

BigBlueButton is an open source web conferencing system. Starting in version 2.2 and up to versions 2.3.18 and 2.4-rc-6, an attacker who is able to obtain the meeting identifier for a meeting on a server can find information related to an external video being shared, like the current timestamp and play/pause. The problem has been patched in versions 2.3.18 and 2.4-rc-6 by modifying the stream to send the data only for users in the meeting. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29234 β€Ό

BigBlueButton is an open source web conferencing system. Starting in version 2.2 and up to versions 2.3.18 and 2.4.1, an attacker could send messages to a locked chat within a grace period of 5s after the lock setting was enacted. The attacker needs to be a participant in the meeting. Versions 2.3.18 and 2.4.1 contain a patch for this issue. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29233 β€Ό

BigBlueButton is an open source web conferencing system. In BigBlueButton starting with 2.2 but before 2.3.18 and 2.4-rc-1, an attacker can circumvent access controls to gain access to all breakout rooms of the meeting they are in. The permission checks rely on knowledge of internal ids rather than on verification of the role of the user. Versions 2.3.18 and 2.4-rc-1 contain a patch for this issue. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29236 β€Ό

BigBlueButton is an open source web conferencing system. Starting in version 2.2 and up to versions 2.3.18 and 2.4-rc-6, an attacker can circumvent access restrictions for drawing on the whiteboard. The permission check is inadvertently skipped on the server, due to a previously introduced grace period. The attacker must be a meeting participant. The problem has been patched in versions 2.3.18 and 2.4-rc-6. There are currently no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
❌ Being prepared for adversarial attacks ❌

There is no question that the level of threats facing today’s businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for? For this episode of the Threatpost podcast, I am joined by Derek Manky, Chief Security Strategist & VP Global Threat Intelligence, Fortinet’s […]

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Insight: Russia is β€˜failing’ in its mission to destabilize Ukraine’s networks after a series of thwarted cyber-attacks πŸ—“οΈ

Speaking at WithSecure’s annual conference, Mikko HyppΓΆnen discussed the threat landscape between the two nations

πŸ“– Read

via "The Daily Swig".
❌ International Authorities Take Down Flubot Malware Network ❌

The info-stealing trojan used SMS messages and lifted contact credentials to spread with unprecedented speed across Android devices globally since December 2020.

πŸ“– Read

via "Threat Post".
❌ Scammers Target NFT Discord Channel ❌

Hackers escalate phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links.

πŸ“– Read

via "Threat Post".