π’ Fresh Microsoft Office zero-day executes code on fully patched applications π’
π Read
via "ITPro".
Malicious documents saved in Rich Text Format are especially concerning since they can execute code without even being openedπ Read
via "ITPro".
ITPro
Fresh Microsoft Office zero-day executes code on fully patched applications
Malicious documents saved in Rich Text Format are especially concerning since they can execute code without even being opened
π’ How to turn on Windows Defender π’
π Read
via "ITPro".
Find out how to switch on Windows Defender in Windows 10 and older versions of the OSπ Read
via "ITPro".
ITPro
How to turn on Windows Defender
A simple guide on how to turn on Windows Defender in Windows 10 and Windows 11, and turn it off again if necessary
β Evil Corp Pivots LockBit to Dodge U.S. Sanctions β
π Read
via "Threat Post".
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity.π Read
via "Threat Post".
Threat Post
Evil Corp Pivots LockBit to Dodge U.S. Sanctions
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity.
π1
π΄ For Ransomware, Speed Matters π΄
π Read
via "Dark Reading".
Someone interested in putting together a ransomware campaign has to consider several factors. The LockBit group touts its speed over competing families to attract potential buyers for its ransowmare-as-a-service.π Read
via "Dark Reading".
Dark Reading
For Ransomware, Speed Matters
Someone interested in putting together a ransomware campaign has to consider several factors. The LockBit group touts its speed over competing families to attract potential buyers for its ransowmare-as-a-service.
β Old Hacks Die Hard: Ransomware, Social Engineering Top Verizon DBIR Threats β Again β
π Read
via "Threat Post".
Deja-Vu data from this year's DBIR report feels like we are stuck in the movie 'Groundhog Day.'π Read
via "Threat Post".
Threat Post
Old Hacks Die Hard: Ransomware, Social Engineering Top Verizon DBIR Threats β Again
Verizonβs annual report for 2022 confirms trends that have been years in the making.
βΌ CVE-2021-42886 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK EX1200T V4.1.2cu.5215 contains an information disclosure vulnerability where an attacker can get the apmib configuration file without authorization, and usernames and passwords can be found in the decoded file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42887 βΌ
π Read
via "National Vulnerability Database".
In TOTOLINK EX1200T V4.1.2cu.5215, an attacker can bypass login by sending a specific request through formLoginAuth.htm.π Read
via "National Vulnerability Database".
π΄ Why Network Object Management Is Critical for Managing Multicloud Network Security π΄
π Read
via "Dark Reading".
If you want your IT and security administrators to get buried in trivial workloads and productivity bottlenecks, having poor network object management is a great way to accomplish that.π Read
via "Dark Reading".
Dark Reading
Why Network Object Management Is Critical for Managing Multicloud Network Security
If you want your IT and security administrators to get buried in trivial workloads and productivity bottlenecks, having poor network object management is a great way to accomplish that.
π Friday Five 6/3 π
π Read
via "".
In this week's Friday Five, read up on how Russian ransomware gangs are wreaking havoc, how software vulnerabilities may put election integrity at risk, and why you should be careful when donating to Ukraine.
π Read
via "".
Digital Guardian
Friday Five 6/3
In this week's Friday Five, read up on how Russian ransomware gangs are wreaking havoc, how software vulnerabilities may put election integrity at risk, and why you should be careful when donating to Ukraine.
βΌ CVE-2021-42888 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK EX1200T V4.1.2cu.5215 contains a remote command injection vulnerability in function setLanguageCfg of the file global.so which can control langType to attack.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42889 βΌ
π Read
via "National Vulnerability Database".
In TOTOLINK EX1200T V4.1.2cu.5215, an attacker can obtain sensitive information (wifikey, wifiname, etc.) without authorization.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42890 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK EX1200T V4.1.2cu.5215 contains a remote command injection vulnerability in function NTPSyncWithHost of the file system.so which can control hostTime to attack.π Read
via "National Vulnerability Database".
β Atlassian announces 0-day hole in Confluence Server β update soon! β
π Read
via "Naked Security".
Zero-day announced - here's what you need to knowπ Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Iconium Software Releases DataLenz v1.3 for IBM zSystems π΄
π Read
via "Dark Reading".
DataLenz delivers real-time, machine learning-based breach detection with user behavior modeling for IBM zSystems.π Read
via "Dark Reading".
Dark Reading
Iconium Software Releases DataLenz v1.3 for IBM zSystems
DataLenz delivers real-time, machine learning-based breach detection with user behavior modeling for IBM zSystems.
π΄ Actively Exploited Atlassian Zero-Day Bug Allows Full System Takeover π΄
π Read
via "Dark Reading".
An unpatched remote code execution (RCE) vulnerability in all versions of the popular Confluence collaboration platform can be abused in credential harvesting, cyber espionage, and network backdoor attacks.π Read
via "Dark Reading".
Dark Reading
Actively Exploited Atlassian Zero-Day Bug Allows Full System Takeover
A remote code execution (RCE) vulnerability in all versions of the popular Confluence collaboration platform can be abused in credential harvesting, cyber espionage, and network backdoor attacks.
π΄ Microsoft Disables Iran-Linked Lebanese Hacking Group Polonium π΄
π Read
via "Dark Reading".
The attack on Israeli organizations is the latest in a long line of attempts to compromise supply chains, as the APT looks to leverage that access to target a multitude of potential victims.π Read
via "Dark Reading".
Dark Reading
Microsoft Disables Iran-Linked Lebanese Hacking Group Polonium
The attack on Israeli organizations is the latest in a long line of attempts to compromise supply chains, as the APT looks to leverage that access to target a multitude of potential victims.
π΄ YourCyanide Ransomware Propagates With PasteBin, Discord, Microsoft Links π΄
π Read
via "Dark Reading".
The latest iteration of CMD-based ransomware is sophisticated and tricky to detect β and integrates token theft and worming capabilities into its feature set.π Read
via "Dark Reading".
Dark Reading
YourCyanide Ransomware Propagates With PasteBin, Discord, Microsoft Links
The latest iteration of CMD-based ransomware is sophisticated and tricky to detect β and integrates token theft and worming capabilities into its feature set.
βΌ CVE-2021-42891 βΌ
π Read
via "National Vulnerability Database".
In TOTOLINK EX1200T V4.1.2cu.5215, an attacker can obtain sensitive information (wifikey, etc.) without authorization.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42892 βΌ
π Read
via "National Vulnerability Database".
In TOTOLINK EX1200T V4.1.2cu.5215, an attacker can start telnet without authorization because the default username and password exists in the firmware.π Read
via "National Vulnerability Database".
βοΈ What Counts as βGood Faith Security Research?β βοΈ
π Read
via "Krebs on Security".
The U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. The new guidelines state that prosecutors should avoid charging security researchers who operate in βgood faithβ when finding and reporting vulnerabilities. But legal experts continue to advise researchers to proceed with caution, noting the new guidelines canβt be used as a defense in court, nor are they any kind of shield against civil prosecution.π Read
via "Krebs on Security".
Krebs on Security
What Counts as βGood Faith Security Research?β
The U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. The new guidelines stateβ¦
βΌ CVE-2021-42893 βΌ
π Read
via "National Vulnerability Database".
In TOTOLINK EX1200T V4.1.2cu.5215, an attacker can obtain sensitive information (wifikey, etc.) without authorization through getSysStatusCfg.π Read
via "National Vulnerability Database".