πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Why convenience is the biggest threat to your security πŸ“’

The shortcuts and human error that lead to breaches - and how to guard against them

πŸ“– Read

via "ITPro".
β€Ό CVE-2022-2242 β€Ό

The KUKA SystemSoftware V/KSS in versions prior to 8.6.5 is prone to improper access control as an unauthorized attacker can directly read and write robot configurations when access control is not available or not enabled (default).

πŸ“– Read

via "National Vulnerability Database".
❌ Microsoft Patches β€˜Dogwalk’ Zero-Day and 17 Critical Flaws ❌

August Patch Tuesday tackles 121 CVEs, 17 critical bugs and one zero-day bug exploited in the wild.

πŸ“– Read

via "Threat Post".
πŸ•΄ UntitledFlow Security Launches Next-Gen Data Security Platform Following $10 Million Seed Round πŸ•΄

First-of-its-kind solution discovers and protects both data at rest and in motion.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Cisco router flaw gives patient attackers full access to small business networks πŸ—“οΈ

Vulnerable path is reachable just once a day, but patches still need to be implemented as a matter of priority

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Compliance Certifications: Worth the Effort? πŸ•΄

Because demonstrating compliance with industry regulations can be cumbersome and expensive, it's important to ensure they're also absolutely essential.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-36324 β€Ό

A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions). Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46304 β€Ό

A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions), CP-8021 MASTER MODULE (All versions), CP-8022 MASTER MODULE WITH GPRS (All versions). The component allows to activate a web server module which provides unauthenticated access to its web pages. This could allow an attacker to retrieve debug-level information from the component such as internal network topology or connected systems.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34661 β€Ό

A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.15), Teamcenter V13.0 (All versions < V13.0.0.10), Teamcenter V13.1 (All versions < V13.1.0.10), Teamcenter V13.2 (All versions < V13.2.0.9), Teamcenter V13.3 (All versions < V13.3.0.5), Teamcenter V14.0 (All versions < V14.0.0.2). File Server Cache service in Teamcenter is vulnerable to denial of service by entering infinite loops and using up CPU cycles. This could allow an attacker to cause denial of service condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34660 β€Ό

A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.15), Teamcenter V13.0 (All versions < V13.0.0.10), Teamcenter V13.1 (All versions < V13.1.0.10), Teamcenter V13.2 (All versions < V13.2.0.9), Teamcenter V13.3 (All versions < V13.3.0.5), Teamcenter V14.0 (All versions < V14.0.0.2). File Server Cache service in Teamcenter consist of a functionality that is vulnerable to command injection. This could potentially allow an attacker to perform remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34659 β€Ό

A vulnerability has been identified in Simcenter STAR-CCM+ (All versions only if the Power-on-Demand public license server is used). Affected applications expose user, host and display name of users, when the public license server is used. This could allow an attacker to retrieve this information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36323 β€Ό

A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions < V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36325 β€Ό

A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions < V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions). Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Deepfence ThreatMapper 1.4 Unveils Open Source Threat Graph to Visualize Cloud-Native Threat Landscape πŸ•΄

New release also includes enterprise-grade cloud security posture management (CSPM) and YARA-based malware scanning capabilities.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ The Security Pros and Cons of Using Email Aliases β™ŸοΈ

One way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a "+" character after the username portion of your email address -- followed by a notation specific to the site you're signing up at -- lets you create an infinite number of unique email addresses tied to the same account. Aliases can help users detect breaches and fight spam. But not all websites allow aliases, and they can complicate account recovery. Here's a look at the pros and cons of adopting a unique alias for each website.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Bugcrowd Taps Top Hackers for Live Hacking Event with Indeed at 2022 Black Hat Conference πŸ•΄

.

πŸ“– Read

via "Dark Reading".
πŸ•΄ OPSWAT Presents New Malware Analysis Capabilities for Operational Technology at Black Hat USA 2022 πŸ•΄

Product enhancements to offer full IT and OT threat intelligence services for OPSWAT customers.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Mimecast Announces Mimecast X1β„’ Platform Providing Customers With Email and Collaboration Security πŸ•΄

Platform engineered to let organizations mitigate risk and manage complexities.

πŸ“– Read

via "Dark Reading".
⚠ APIC/EPIC! Intel chips leak secrets even the kernel shouldn’t see… ⚠

If you've ever written code that left stuff lying around in memory when you didn't need it any more... we bet you've regretted it!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-38133 β€Ό

In JetBrains TeamCity before 2022.04.3 the private SSH key could be written to the server log in some cases

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33926 β€Ό

Dell Wyse Management Suite 3.6.1 and below contains an improper access control vulnerability. A remote malicious user could exploit this vulnerability in order to retain access to a file repository after it has been revoked.

πŸ“– Read

via "National Vulnerability Database".