πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-33881 β€Ό

Parsing a maliciously crafted PRT file can force Autodesk AutoCAD 2023 to read beyond allocated boundaries. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35629 β€Ό

Due to a bug in the handling of the communication between the client and server, it was possible for one client, already registered with their own client ID, to send messages to the server claiming to come from another client ID. This issue was resolved in Velociraptor 0.6.5-2.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Security Teams Overwhelmed With Bugs, Bitten by Patch Prioritization πŸ•΄

The first half of the year saw more than 11,800 reported security vulnerabilities, but figuring out which ones to patch first remains a thankless job for IT teams.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Why Bug-Bounty Programs Are Failing Everyone πŸ•΄

In a Black Hat USA talk, Katie Moussouris will discuss why bug-bounty programs are failing in their goals, and what needs to happen next to use bounties in a way that improves security outcomes.

πŸ“– Read

via "Dark Reading".
πŸ‘1
β™ŸοΈ 911 Proxy Service Implodes After Disclosing Breach β™ŸοΈ

911[.]re, a proxy service that since 2015 has sold access to hundreds of thousands of Microsoft Windows computers daily, announced this week that it is shutting down in the wake of a data breach that destroyed key components of its business operations. The abrupt closure comes ten days after KrebsOnSecurity published an in-depth look at 911 and its connections to shady pay-per-install affiliate programs that secretly bundled 911’s proxy software with other titles, including β€œfree” utilities and pirated software.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2022-2414 β€Ό

Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23004 β€Ό

When computing a shared secret or point multiplication on the NIST P-256 curve using a public key with an X coordinate of zero, an error is returned from the library, and an invalid unreduced value is written to the output buffer. This may be leveraged by an attacker to cause an error scenario, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36378 β€Ό

Authenticated (author or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in PluginlySpeaking Floating Div plugin <= 3.0 at WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23002 β€Ό

When compressing or decompressing a point on the NIST P-256 elliptic curve with an X coordinate of zero, the resulting output is not properly reduced modulo the P-256 field prime and is invalid. The resulting output will cause an error when used in other operations. This may be leveraged by an attacker to cause an error scenario in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23001 β€Ό

When compressing or decompressing elliptic curve points using the Sweet B library, an incorrect choice of sign bit is used. An attacker with user level privileges and no other user's assistance can exploit this vulnerability with only knowledge of the public key and the library. The resulting output may cause an error when used in other operations; for instance, verification of a valid signature under a decompressed public key may fail. This may be leveraged by an attacker to cause an error scenario in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23003 β€Ό

When computing a shared secret or point multiplication on the NIST P-256 curve that results in an X coordinate of zero, the resulting output is not properly reduced modulo the P-256 field prime and is invalid. The resulting output may cause an error when used in other operations. This may be leveraged by an attacker to cause an error scenario or incorrect choice of session key in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Attackers Have 'Favorite' Vulnerabilities to Exploit πŸ•΄

While attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.

πŸ“– Read

via "Dark Reading".
πŸ•΄ AWS Focuses on Identity Access Management at re:Inforce πŸ•΄

Identity and access management was front and center at AWS re:inforce this week.

πŸ“– Read

via "Dark Reading".
πŸ•΄ ICYMI: Dark Web Happenings Edition With Evil Corp., MSP Targeting & More πŸ•΄

Dark Reading's digest of other "don't-miss" stories of the week β€” including a Microsoft alert connecting disparate cybercrime activity together, and an explosion of Luca Stealer variants after an unusual Dark Web move.

πŸ“– Read

via "Dark Reading".
πŸ“’ The pros and cons of net neutrality πŸ“’

Still on the fence about net neutrality? Here are both sides of the argument

πŸ“– Read

via "ITPro".
πŸ“’ Cyber attack on US court system being investigated, DoJ confirms πŸ“’

The early 2020 attack, publicly disclosed for the first time this week, is thought to have had a "staggering effect" on the department and other agencies

πŸ“– Read

via "ITPro".
πŸ“’ Six cyber security holes you need to plug now πŸ“’

We shine a light on the easily overlooked cyber cracks that can turn into major sinkholes exposing your business

πŸ“– Read

via "ITPro".
πŸ“’ IT Pro News In Review: Rise in ransomware attacks, UK & South Korea 5G & 6G, IBM data breach report πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
πŸ“’ How to boot Windows 11 in Safe Mode πŸ“’

Unless you’re a complete Windows novice, you’ll have come across Safe Mode before - but what exactly is it, and how do you access it in Windows 11?

πŸ“– Read

via "ITPro".
β€Ό CVE-2022-27865 β€Ό

A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".