βΌ CVE-2022-30224 βΌ
π Read
via "National Vulnerability Database".
Windows Advanced Local Procedure Call Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22037, CVE-2022-30202.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33671 βΌ
π Read
via "National Vulnerability Database".
Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33675, CVE-2022-33677.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33675 βΌ
π Read
via "National Vulnerability Database".
Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33677.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22711 βΌ
π Read
via "National Vulnerability Database".
Windows BitLocker Information Disclosure Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35628 βΌ
π Read
via "National Vulnerability Database".
A SQL injection issue was discovered in the lux extension before 17.6.1, and 18.x through 24.x before 24.0.2, for TYPO3.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22022 βΌ
π Read
via "National Vulnerability Database".
Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22041, CVE-2022-30206, CVE-2022-30226.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22036 βΌ
π Read
via "National Vulnerability Database".
Performance Counters for Windows Elevation of Privilege Vulnerability.π Read
via "National Vulnerability Database".
βοΈ Microsoft Patch Tuesday, July 2022 Edition βοΈ
π Read
via "Krebs on Security".
Microsoft today released updates to fix at least 86 security vulnerabilities in its Windows operating systems and other software, including a weakness in all supported versions of Windows that Microsoft warns is actively being exploited. The software giant also has made a controversial decision to put the brakes on a plan to block macros in Office documents downloaded from the Internet.π Read
via "Krebs on Security".
Krebs on Security
Microsoft Patch Tuesday, July 2022 Edition
Microsoft today released updates to fix at least 86 security vulnerabilities in its Windows operating systems and other software, including a weakness in all supported versions of Windows that Microsoft warns is actively being exploited. The software giantβ¦
β Large-Scale Phishing Campaign Bypasses MFA β
π Read
via "Threat Post".
Attackers used adversary-in-the-middle attacks to steal passwords, hijack sign-in sessions and skip authentication and then use victim mailboxes to launch BEC attacks against other targets.π Read
via "Threat Post".
Threat Post
Large-Scale Phishing Campaign Bypasses MFA
Attackers used adversary-in-the-middle attacks to steal passwords, hijack sign-in sessions and skip authentication and then use victim mailboxes to launch BEC attacks against other targets.
π΄ QuickBooks Vishing Scam Targets Small Businesses π΄
π Read
via "Dark Reading".
Businesses receive an invoice via email with a credit card charge and are asked to call a fake number and hand over personal information to receive a refund.π Read
via "Dark Reading".
Dark Reading
QuickBooks Vishing Scam Targets Small Businesses
Businesses receive an invoice via email with a credit card charge and are asked to call a fake number and hand over personal information to receive a refund.
ποΈ Vivaldi browser founder Jon von Tetzchner puts privacy at the center of development ποΈ
π Read
via "The Daily Swig".
A man for all four seasonsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Vivaldi browser founder Jon von Tetzchner puts privacy at the center of development
A man for all four seasons
π΄ Exostar Empowers SMBs with Enhanced, Low-Cost, Easy-to-Use Microsoft 365 and CMMC 2.0 Solutions π΄
π Read
via "Dark Reading".
Upgrades to the Exostar platform promote secure, compliant collaboration and handling of controlled unclassified information.π Read
via "Dark Reading".
Dark Reading
Exostar Empowers SMBs with Enhanced, Low-Cost, Easy-to-Use Microsoft 365 and CMMC 2.0 Solutions
Upgrades to the Exostar platform promote secure, compliant collaboration and handling of controlled unclassified information.
π΄ Keep Humans in the Loop in SOC Operations π΄
π Read
via "Dark Reading".
Machine learning and automation can help free up security pros for higher-value tasks.π Read
via "Dark Reading".
Dark Reading
Keep Humans in the Loop in SOC Operations
Machine learning and automation can help free up security pros for higher-value tasks.
βΌ CVE-2020-35257 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2019-10800 βΌ
π Read
via "National Vulnerability Database".
This affects the package codecov before 2.0.16. The vulnerability occurs due to not sanitizing gcov arguments before being being provided to the popen method.π Read
via "National Vulnerability Database".
βΌ CVE-2021-27294 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".
ποΈ Vulnerability in AWS IAM Authenticator for Kubernetes could allow user impersonation, privilege escalation attacks ποΈ
π Read
via "The Daily Swig".
Flaw in Amazonβs Kubernetes service has since been fixedπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Vulnerability in AWS IAM Authenticator for Kubernetes could allow user impersonation, privilege escalation attacks
Flaw in Amazonβs Kubernetes service has since been fixed
π΄ New Research Reveals 93% of Organizations Surveyed Have Had Failed IIoT/OT Security Projects π΄
π Read
via "Dark Reading".
Barracuda research finds organizations are struggling to protect operational technology and getting breached as a result.π Read
via "Dark Reading".
Dark Reading
New Research Reveals 93% of Organizations Surveyed Have Had Failed IIoT/OT Security Projects
Barracuda research finds organizations are struggling to protect operational technology and getting breached as a result.
π΄ US Government and QuSecure Orchestrate First-Ever Post-Quantum Encryption Communication over a Government Network π΄
π Read
via "Dark Reading".
QuSecureβs QuProtect leverages unique post-quantum cryptographic algorithm on government legacy systems to achieve worldβs first and only post-quantum resilient channel within a government facility.π Read
via "Dark Reading".
Dark Reading
US Government and QuSecure Orchestrate First-Ever Post-Quantum Encryption Communication over a Government Network
QuSecureβs QuProtect leverages unique post-quantum cryptographic algorithm on government legacy systems to achieve worldβs first and only post-quantum resilient channel within a government facility.
π΄ Microsoft: 10,000 Orgs Targeted in Phishing Attack That Bypasses Multifactor Authentication π΄
π Read
via "Dark Reading".
The massive phishing campaign does not exploit a vulnerability in MFA. Instead, it spoofs an Office 365 authentication page to steal credentials.π Read
via "Dark Reading".
Dark Reading
Microsoft: 10,000 Orgs Targeted in Phishing Attack That Bypasses Multifactor Authentication
The massive phishing campaign does not exploit a vulnerability in MFA. Instead, it spoofs an Office 365 authentication page to steal credentials.
β Paying ransomware crooks wonβt reduce your legal risk, warns regulator β
π Read
via "Naked Security".
"We paid the crooks to keep things under control and make a bad thing better"... isn't a valid excuse. Who knew?π Read
via "Naked Security".
Naked Security
Paying ransomware crooks wonβt reduce your legal risk, warns regulator
βWe paid the crooks to keep things under control and make a bad thing betterββ¦ isnβt a valid excuse. Who knew?