ποΈ Vulnerability in AWS IAM Authenticator for Kubernetes could allow user impersonation, privilege escalation attacks ποΈ
π Read
via "The Daily Swig".
Flaw in Amazonβs Kubernetes service has since been fixedπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Vulnerability in AWS IAM Authenticator for Kubernetes could allow user impersonation, privilege escalation attacks
Flaw in Amazonβs Kubernetes service has since been fixed
π΄ New Research Reveals 93% of Organizations Surveyed Have Had Failed IIoT/OT Security Projects π΄
π Read
via "Dark Reading".
Barracuda research finds organizations are struggling to protect operational technology and getting breached as a result.π Read
via "Dark Reading".
Dark Reading
New Research Reveals 93% of Organizations Surveyed Have Had Failed IIoT/OT Security Projects
Barracuda research finds organizations are struggling to protect operational technology and getting breached as a result.
π΄ US Government and QuSecure Orchestrate First-Ever Post-Quantum Encryption Communication over a Government Network π΄
π Read
via "Dark Reading".
QuSecureβs QuProtect leverages unique post-quantum cryptographic algorithm on government legacy systems to achieve worldβs first and only post-quantum resilient channel within a government facility.π Read
via "Dark Reading".
Dark Reading
US Government and QuSecure Orchestrate First-Ever Post-Quantum Encryption Communication over a Government Network
QuSecureβs QuProtect leverages unique post-quantum cryptographic algorithm on government legacy systems to achieve worldβs first and only post-quantum resilient channel within a government facility.
π΄ Microsoft: 10,000 Orgs Targeted in Phishing Attack That Bypasses Multifactor Authentication π΄
π Read
via "Dark Reading".
The massive phishing campaign does not exploit a vulnerability in MFA. Instead, it spoofs an Office 365 authentication page to steal credentials.π Read
via "Dark Reading".
Dark Reading
Microsoft: 10,000 Orgs Targeted in Phishing Attack That Bypasses Multifactor Authentication
The massive phishing campaign does not exploit a vulnerability in MFA. Instead, it spoofs an Office 365 authentication page to steal credentials.
β Paying ransomware crooks wonβt reduce your legal risk, warns regulator β
π Read
via "Naked Security".
"We paid the crooks to keep things under control and make a bad thing better"... isn't a valid excuse. Who knew?π Read
via "Naked Security".
Naked Security
Paying ransomware crooks wonβt reduce your legal risk, warns regulator
βWe paid the crooks to keep things under control and make a bad thing betterββ¦ isnβt a valid excuse. Who knew?
π΄ Survey: Small Cybersecurity Teams Face Greater Risk from Attacks than Larger Enterprises π΄
π Read
via "Dark Reading".
Cynet CISO survey reveals lack of staff, skills, and resources driving smaller teams to outsource security with advanced tools, technologies, and services.π Read
via "Dark Reading".
Dark Reading
Survey: Small Cybersecurity Teams Face Greater Risk from Attacks than Larger Enterprises
Cynet CISO survey reveals lack of staff, skills, and resources driving smaller teams to outsource security with advanced tools, technologies, and services.
βΌ CVE-2020-35259 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32274 βΌ
π Read
via "National Vulnerability Database".
The Transition Scheduler add-on 6.5.0 for Atlassian Jira is prone to stored XSS via the project name to the creation function.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32065 βΌ
π Read
via "National Vulnerability Database".
An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.π Read
via "National Vulnerability Database".
β Facebook 2FA scammers return β this time in just 21 minutes β
π Read
via "Naked Security".
Last time they arrived 28 minutes after lighting up their fake domain... this time it was just 21 minutesπ Read
via "Naked Security".
Naked Security
Facebook 2FA scammers return β this time in just 21 minutes
Last time they arrived 28 minutes after lighting up their fake domain⦠this time it was just 21 minutes
π UK Urges Organizations Not to Pay Ransomware Payments π
π Read
via "".
The UK ICO and NCSC issued a letter to UK lawyers stressing that paying the demands of ransomware actors is not advisable.π Read
via "".
βΌ CVE-2022-34358 βΌ
π Read
via "National Vulnerability Database".
IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 230516.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32096 βΌ
π Read
via "National Vulnerability Database".
Rhonabwy before v1.1.5 was discovered to contain a buffer overflow via the component r_jwe_aesgcm_key_unwrap. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted JWE token.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32074 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in the component audit/class.audit.php of osTicket-plugins - Storage-FS before commit a7842d494889fd5533d13deb3c6a7789768795ae allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32073 βΌ
π Read
via "National Vulnerability Database".
WolfSSH v1.4.7 was discovered to contain an integer overflow via the function wolfSSH_SFTP_RecvRMDIR.π Read
via "National Vulnerability Database".
π΄ 3 Golden Rules of Modern Third-Party Risk Management π΄
π Read
via "Dark Reading".
It's time to expand the approach of TPRM solutions so risk management is more effective in the digital world.π Read
via "Dark Reading".
Dark Reading
3 Golden Rules of Modern Third-Party Risk Management
It's time to expand the approach of TPRM solutions so risk management is more effective in the digital world.
π΄ Internet Searches Reveal Surprisingly Prevalent Ransomware π΄
π Read
via "Dark Reading".
Two mostly defunct threats β WannaCry and NonPetya β top the list of ransomware searches, but does that mean they are still causing problems?π Read
via "Dark Reading".
Dark Reading
Internet Searches Reveal Surprisingly Prevalent Ransomware
Two mostly defunct threats β WannaCry and NonPetya β top the list of ransomware searches, but does that mean they are still causing problems?
π΄ MacOS Bug Could Let Malicious Code Break Out of Application Sandbox π΄
π Read
via "Dark Reading".
Microsoft reveals now-fixed flaw in Apple's App Sandbox controls could allow attackers to escalate device privileges and deploy malware.π Read
via "Dark Reading".
Dark Reading
MacOS Bug Could Let Malicious Code Break Out of Application Sandbox
Microsoft reveals now-fixed flaw in Apple's App Sandbox controls could allow attackers to escalate device privileges and deploy malware.
π΄ The 3 Critical Elements You Need for Vulnerability Management Today π΄
π Read
via "Dark Reading".
Most organizations are flying blind when remediating vulnerabilities. We lack the tooling to secure software fast enough. We need a new approach to vulnerability management now.π Read
via "Dark Reading".
Dark Reading
The 3 Critical Elements You Need for Vulnerability Management Today
Most organizations are flying blind when remediating vulnerabilities. We lack the tooling to secure software fast enough. We need a new approach to vulnerability management now.
βΌ CVE-2022-20238 βΌ
π Read
via "National Vulnerability Database".
'remap_pfn_range' here may map out of size kernel memory (for example, may map the kernel area), and because the 'vma->vm_page_prot' can also be controlled by userspace, so userspace may map the kernel area to be writable, which is easy to be exploitedProduct: AndroidVersions: Android SoCAndroid ID: A-233154555π Read
via "National Vulnerability Database".
βΌ CVE-2022-20234 βΌ
π Read
via "National Vulnerability Database".
In Car Settings app, the NotificationAccessConfirmationActivity is exported. In NotificationAccessConfirmationActivity, it gets both 'mComponentName' and 'pkgTitle' from user.An unprivileged app can use a malicous mComponentName with a benign pkgTitle (e.g. Settings app) to make users enable notification access permission for the malicious app. That is, users believe they enable the notification access permission for the Settings app, but actually they enable the notification access permission for the malicious app.Once the malicious app gets the notification access permission, it can read all notifications, including users' personal information.Product: AndroidVersions: Android-12LAndroid ID: A-225189301π Read
via "National Vulnerability Database".