πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-42892 β€Ό

In TOTOLINK EX1200T V4.1.2cu.5215, an attacker can start telnet without authorization because the default username and password exists in the firmware.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ What Counts as β€œGood Faith Security Research?” β™ŸοΈ

The U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. The new guidelines state that prosecutors should avoid charging security researchers who operate in β€œgood faith” when finding and reporting vulnerabilities. But legal experts continue to advise researchers to proceed with caution, noting the new guidelines can’t be used as a defense in court, nor are they any kind of shield against civil prosecution.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2021-42893 β€Ό

In TOTOLINK EX1200T V4.1.2cu.5215, an attacker can obtain sensitive information (wifikey, etc.) without authorization through getSysStatusCfg.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26493 β€Ό

Multiple vulnerabilities vulnerability in Drupal SAML SP 2.0 Single Sign On (SSO) - SAML Service Provider in certain non-default configurations allow a malicious user to login as any chosen user. The vulnerability is mitigated by the module's default settings which require the options "Either sign SAML assertions" and "x509 certificate". This issue affects: Drupal SAML SP 2.0 Single Sign On (SSO) - SAML Service Provider 8.x version 8.x-2.24 and prior versions; 7.x version 7.x-2.57 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ FDA: Patch Illumina DNA Sequencing Instruments, Stat πŸ•΄

A critical security bug could lead to remote device control, altered lab results, and more, putting patients in danger, agency warns.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-29770 β€Ό

XXL-Job v2.3.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via /xxl-job-admin/jobinfo.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43271 β€Ό

Riverbed AppResponse 11.8.0, 11.8.5, 11.8.5a, 11.9.0, 11.9.0a, 11.10.0, 11.11.0, 11.11.0a, 11.11.1, 11.11.1a, 11.11.5, and 11.11.5a (when configured to use local, RADIUS, or TACACS authentication) logs usernames and passwords if either is entered incorrectly. If a user enters an incorrect username and/or password when logging into the WebUI, these attempted credentials are included in an error message that is logged in the WebUI log file. A log entry does not appear if the username and password provided correctly match a valid set of credentials. This also does not happen if AppResponse is configured to use SAML authentication. The WebUI log file is included in subsequent diagnostic system dumps that are generated. (Only users with Full Control access to the System Configuration permission can generate system dumps. By default, only System Administrators have Full Control access to the System Configuration permission.)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29784 β€Ό

PublicCMS V4.0.202204.a and below contains an information leak via the component /views/directive/sys/SysConfigDataDirective.java.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29778 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-890L 1.20b01 allows attackers to execute arbitrary code due to the hardcoded option Wake-On-Lan for the parameter 'descriptor' at SetVirtualServerSettings.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-29773 β€Ό

An access control issue in aleksis/core/util/auth_helpers.py: ClientProtectedResourceMixin of AlekSIS-Core v2.8.1 and below allows attackers to access arbitrary scopes if no allowed scopes are specifically set.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Incoming! Atlassian Confluence attacks prompt calls for rapid patching πŸ—“οΈ

China suspected in assaults against enterprises running collaboration platform

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Name That Edge Toon: Hey, Batter Batter! πŸ•΄

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Are You Ready for a Breach in Your Organization's Slack Workspace? πŸ•΄

A single compromised Slack account can easily be leveraged to deceive other users and gain additional access to other users and multiple Slack channels.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-42245 β€Ό

FlatCore-CMS 2.0.9 has a cross-site scripting (XSS) vulnerability in pages.edit.php through meta tags and content sections.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Unpatched bug chain poses β€˜mass account takeover’ threat to Yunmai weight monitoring app πŸ—“οΈ

User data related to at least 500,000 Android accounts at risk

πŸ“– Read

via "The Daily Swig".
πŸ›  Falco 0.32.0 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Zeek 4.2.2 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ”₯1
πŸ•΄ The CISO Shortlist: Top Priorities at RSA 2022 πŸ•΄

The buzz on the show floor during RSA Conference is about aligning the organization's security priorities with the right technology. Will Lin, managing director and founding member at Forgepoint Capital, weighs in on the biggest security priorities for 2022 β€” and what kind of tech senior-level executives are looking for.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cybersecurity M&A Activity Shows No Signs of Slowdown πŸ•΄

But valuations have dropped β€” and investors are paying closer attention to revenues and profitability, industry analysts say.

πŸ“– Read

via "Dark Reading".
⚠ Atlassian announces 0-day hole in Confluence Server – update now! ⚠

Zero-day announced - here's what you need to know

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-30861 β€Ό

FUDforum 3.1.2 is vulnerable to Stored XSS via Forum Name field in Forum Manager Feature.

πŸ“– Read

via "National Vulnerability Database".