π΄ Rare 'CosmicStrand' UEFI Rootkit Swings into Cybercrime Orbit π΄
π Read
via "Dark Reading".
The firmware threat offers ultimate stealth and persistence β and may be distributed via tainted firmware components in a supply chain play, researchers theorize.π Read
via "Dark Reading".
Dark Reading
Rare 'CosmicStrand' UEFI Rootkit Swings into Cybercrime Orbit
The firmware threat offers ultimate stealth and persistence β and may be distributed via tainted firmware components in a supply chain play, researchers theorize.
βΌ CVE-2022-34907 βΌ
π Read
via "National Vulnerability Database".
An authentication bypass vulnerability exists in FileWave before 14.6.3 and 14.7.x before 14.7.2. Exploitation could allow an unauthenticated actor to gain access to the system with the highest authority possible and gain full control over the FileWave platform.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34906 βΌ
π Read
via "National Vulnerability Database".
A hard-coded cryptographic key is used in FileWave before 14.6.3 and 14.7.x before 14.7.2. Exploitation could allow an unauthenticated actor to decrypt sensitive information saved in FileWave, and even send crafted requests.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35131 βΌ
π Read
via "National Vulnerability Database".
Joplin v2.8.8 allows attackers to execute arbitrary commands via a crafted payload injected into the Node titles.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36375 βΌ
π Read
via "National Vulnerability Database".
Authenticated (high role user) WordPress Options Change vulnerability in Biplob Adhikari's Tabs plugin <= 3.6.0 at WordPress.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2020-36290 βΌ
π Read
via "National Vulnerability Database".
The Livesearch macro in Confluence Server and Data Center before version 7.4.5, from version 7.5.0 before 7.6.3, and from version 7.7.0 before version 7.7.4 allows remote attackers with permission to edit a page or blog to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the page excerpt functionality.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22686 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in webapi component in Synology Calendar before 2.3.4-0631 allows remote authenticated users to hijack the authentication of administrators via unspecified vectors.π Read
via "National Vulnerability Database".
ποΈ Cloud fax company claims healthcare pros are ditching email for βmore secureβ fax ποΈ
π Read
via "The Daily Swig".
The fax is dead. Long live the online fax? A new study suggests many healthcare professionals believe that flaws in todayβs web security landscape are prompting a return to whatβs been deemed an βextrπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Cloud fax company claims healthcare pros are ditching email for βmore secureβ fax
The fax is dead. Long live the online fax?
β IoT Botnets Fuels DDoS Attacks β Are You Prepared? β
π Read
via "Threat Post".
The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies DDoS attacks today. This is a dangerous warning that the possibility of a sophisticated DDoS attack and a prolonged service outage will prevent businesses from growing.π Read
via "Threat Post".
Threat Post
IoT Botnets Fuels DDoS Attacks β Are You Prepared?
The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies DDoS attacks today. Learn more.
β Phishing Attacks Skyrocket with Microsoft and Facebook as Most Abused Brands β
π Read
via "Threat Post".
Instances of phishing attacks leveraging the Microsoft brand increased 266 percent in Q1 compared to the year prior.π Read
via "Threat Post".
Threat Post
Phishing Attacks Skyrocket with Microsoft and Facebook as Most Abused Brands
Instances of phishing attacks leveraging the Microsoft brand increased 266 percent in Q1 compared to the year prior.
π1
ποΈ Critical security vulnerability in Grails could lead to remote code execution ποΈ
π Read
via "The Daily Swig".
Maintainers warn to patch all versions of open source web app framework β even those not deemed vulnerableπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Critical security vulnerability in Grails could lead to remote code execution
Maintainers warn to patch all versions of open source web app framework β even those not deemed vulnerable
π΄ The Beautiful Lies of Machine Learning in Security π΄
π Read
via "Dark Reading".
Machine learning should be considered an extension of β not a replacement for β existing security methods, systems, and teams.π Read
via "Dark Reading".
Dark Reading
The Beautiful Lies of Machine Learning in Security
Machine learning should be considered an extension of β not a replacement for β existing security methods, systems, and teams.
π΄ Siemens Energy Takes Next Step to Protect Critical Infrastructure π΄
π Read
via "Dark Reading".
Company joins AWS Partner Network to provide customers with industrial cybersecurity solution to ensure reliable electricity and fuel supplies.π Read
via "Dark Reading".
Dark Reading
Siemens Energy Takes Next Step to Protect Critical Infrastructure
Company joins AWS Partner Network to provide customers with industrial cybersecurity solution to ensure reliable electricity and fuel supplies.
βΌ CVE-2021-33457 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmac_params() in modules/preprocs/nasm/nasm-pp.c.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33745 βΌ
π Read
via "National Vulnerability Database".
insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33460 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in if_condition() in modules/preprocs/nasm/nasm-pp.c.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33451 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in lrzip version 0.641. There are memory leaks in fill_buffer() in stream.c.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33440 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_commit() in mjs.c.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36161 βΌ
π Read
via "National Vulnerability Database".
Orange Station 1.0 was discovered to contain a SQL injection vulnerability via the username parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33461 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in yasm version 1.3.0. There is a use-after-free in yasm_intnum_destroy() in libyasm/intnum.c.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33464 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in yasm version 1.3.0. There is a heap-buffer-overflow in inc_fopen() in modules/preprocs/nasm/nasm-pp.c.π Read
via "National Vulnerability Database".