π΄ CREST Defensible Penetration Test Released π΄
π Read
via "Dark Reading".
CREST provides commercially defensible scoping, delivery, and sign-off recommendations for penetration tests.π Read
via "Dark Reading".
Dark Reading
CREST Defensible Penetration Test Released
<p>CREST provides commercially defensible scoping, delivery, and sign-off
recommendations for penetration tests.</p>
recommendations for penetration tests.</p>
π΄ BlackCloak Bolsters Malware Protection With QR Code Scanner and Malicious Calendar Detection Features π΄
π Read
via "Dark Reading".
In conjunction with Black Hat 2022, pioneer of digital executive protection also announces new security innovations and SOC 2 Type II certification.π Read
via "Dark Reading".
Dark Reading
BlackCloak Bolsters Malware Protection With QR Code Scanner and Malicious Calendar Detection Features
In conjunction with Black Hat 2022, pioneer of digital executive protection also announces new security innovations and SOC 2 Type II certification.
π΄ Incognia Mobile App Study Reveals Low Detection of Location Spoofing in Dating Apps π΄
π Read
via "Dark Reading".
With over 323 million users of dating apps worldwide, study finds location spoofing is a threat to user trust and safety.π Read
via "Dark Reading".
Dark Reading
Incognia Mobile App Study Reveals Low Detection of Location Spoofing in Dating Apps
With over 323 million users of dating apps worldwide, study finds location spoofing is a threat to user trust and safety.
ποΈ Trio of XSS bugs in open source web apps could lead to complete system compromise ποΈ
π Read
via "The Daily Swig".
Evolution CMS, FUDForum, and GitBucket vulnerabilities chained for maximum impactπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Trio of XSS bugs in open source web apps could lead to complete system compromise
Evolution CMS, FUDForum, and GitBucket vulnerabilities chained for maximum impact
π΄ VirusTotal: Threat Actors Mimic Legitimate Apps, Use Stolen Certs to Spread Malware π΄
π Read
via "Dark Reading".
Attackers are turning to stolen credentials and posing as trusted applications to socially engineer victims, according to Google study of malware submitted to VirusTotal.π Read
via "Dark Reading".
Dark Reading
VirusTotal: Threat Actors Mimic Legitimate Apps, Use Stolen Certs to Spread Malware
Attackers are turning to stolen credentials and posing as trusted applications to socially engineer victims, according to Google study of malware submitted to VirusTotal.
βΌ CVE-2020-28437 βΌ
π Read
via "National Vulnerability Database".
This affects all versions of package heroku-env. The injection point is located in lib/get.js which is required by index.js.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28434 βΌ
π Read
via "National Vulnerability Database".
This affects all versions of package gitblame. The injection point is located in line 15 in lib/gitblame.js.π Read
via "National Vulnerability Database".
βΌ CVE-2020-7795 βΌ
π Read
via "National Vulnerability Database".
The package get-npm-package-version before 1.0.7 are vulnerable to Command Injection via main function in index.js.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25867 βΌ
π Read
via "National Vulnerability Database".
The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28433 βΌ
π Read
via "National Vulnerability Database".
This affects all versions of package node-latex-pdf.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28451 βΌ
π Read
via "National Vulnerability Database".
This affects the package image-tiler before 2.0.2.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23385 βΌ
π Read
via "National Vulnerability Database".
This affects all versions of package Flask-Security. When using the get_post_logout_redirect and get_post_login_redirect functions, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. **Note:** Flask-Security is not maintained anymore.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29154 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).π Read
via "National Vulnerability Database".
βΌ CVE-2022-34613 βΌ
π Read
via "National Vulnerability Database".
Mealie 1.0.0beta3 contains an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34618 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in Mealie 1.0.0beta3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the recipe description text field.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28425 βΌ
π Read
via "National Vulnerability Database".
This affects all versions of package curljs.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28423 βΌ
π Read
via "National Vulnerability Database".
This affects all versions of package monorepo-build.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28424 βΌ
π Read
via "National Vulnerability Database".
This affects all versions of package s3-kilatstorage.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28453 βΌ
π Read
via "National Vulnerability Database".
This affects all versions of package npos-tesseract. The injection point is located in line 55 in lib/ocr.js.π Read
via "National Vulnerability Database".
β Cryptocoin βtoken swapperβ Nomad loses $200 million in coding blunder β
π Read
via "Naked Security".
Transactions were only approved, it seems, if they were initiated by... errrrr, by anyone.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Microsoft Intros New Attack Surface Management, Threat Intel Tools π΄
π Read
via "Dark Reading".
Microsoft says the new tools will give security teams an attacker's-eye view of their systems and supercharge their investigation and remediation efforts.π Read
via "Dark Reading".
Dark Reading
Microsoft Intros New Attack Surface Management, Threat Intel Tools
Microsoft says the new tools will give security teams an attacker's-eye view of their systems and supercharge their investigation and remediation efforts.