βΌ CVE-2022-26529 βΌ
π Read
via "National Vulnerability Database".
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for segmented packetsΓ’β¬β’ link parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46837 βΌ
π Read
via "National Vulnerability Database".
res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25646 βΌ
π Read
via "National Vulnerability Database".
All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38116 βΌ
π Read
via "National Vulnerability Database".
Le-yan Personnel and Salary Management System has hard-coded database account and password within the website source code. An unauthenticated remote attacker can access, modify system data or disrupt service.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-25887 βΌ
π Read
via "National Vulnerability Database".
The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-2330 βΌ
π Read
via "National Vulnerability Database".
Improper Restriction of XML External Entity Reference vulnerability in DLP Endpoint for Windows prior to 11.9.100 and 11.6.600 allows a remote attacker to cause the DLP Agent to access a local service that the attacker wouldn't usually have access to via a carefully constructed XML file, which the DLP Agent doesn't parse correctly.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38118 βΌ
π Read
via "National Vulnerability Database".
OAKlouds Portal websiteΓ’β¬β’s Meeting Room has insufficient validation for user input. A remote attacker with general user privilege can perform SQL-injection to access, modify, delete database, perform system operations and disrupt service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25857 βΌ
π Read
via "National Vulnerability Database".
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26528 βΌ
π Read
via "National Vulnerability Database".
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the length of segmented packetsΓ’β¬β’ shift parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.π Read
via "National Vulnerability Database".
ποΈ Graph-based JavaScript bug scanner discovers more than 100 zero-day vulnerabilities in Node.js libraries ποΈ
π Read
via "The Daily Swig".
ODGen tool was presented at this yearβs Usenix Security Symposiumπ Read
via "The Daily Swig".
portswigger.net
Web Application Security, Testing, & Scanning - PortSwigger
PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of security tools, & identify the very latest vulnerabilities.
β LastPass source code breach β do we still recommend password managers? β
π Read
via "Naked Security".
What does the recent LastPass breach mean for password managers? Just a bump in the road, or a reason to ditch them entirely?π Read
via "Naked Security".
Naked Security
LastPass source code breach β do we still recommend password managers?
What does the recent LastPass breach mean for password managers? Just a bump in the road, or a reason to ditch them entirely?
π1
βΌ CVE-2022-3063 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Generic in GitHub repository nuxt/framework prior to -.π Read
via "National Vulnerability Database".
π΄ A Peek Into CISA's Post-Quantum Cryptography Roadmap π΄
π Read
via "Dark Reading".
To help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.π Read
via "Dark Reading".
Dark Reading
A Peek Into CISA's Post-Quantum Cryptography Roadmap
To help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.
π΄ Cerberus Sentinel Announces Acquisition of CUATROi π΄
π Read
via "Dark Reading".
US cybersecurity services firm expands services in Latin America.π Read
via "Dark Reading".
Dark Reading
Cerberus Sentinel Announces Acquisition of CUATROi
US cybersecurity services firm expands services in Latin America.
π1
π΄ Building a Strong SOC Starts With People π΄
π Read
via "Dark Reading".
A people-first approach reduces fatigue and burnout, and it empowers employees to seek out development opportunities, which helps retention.π Read
via "Dark Reading".
Dark Reading
Building a Strong SOC Starts With People
A people-first approach reduces fatigue and burnout, and it empowers employees to seek out development opportunities, which helps retention.
π΄ Phishing Campaign Targets PyPI Users to Distribute Malicious Code π΄
π Read
via "Dark Reading".
The first-of-its-kind campaign threatens to remove code packages if developers donβt submit their code to a "validation" process.π Read
via "Dark Reading".
Dark Reading
Phishing Campaign Targets PyPI Users to Distribute Malicious Code
The first-of-its-kind campaign threatens to remove code packages if developers donβt submit their code to a "validation" process.
βοΈ How 1-Time Passcodes Became a Corporate Liability βοΈ
π Read
via "Krebs on Security".
Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some of the world's largest technology companies and customer support firms. A recent spate of SMS phishing attacks from one cybercriminal group has spawned a flurry of breach disclosures from affected companies, which are all struggling to combat the same lingering security threat: The ability of scammers to interact directly with employees through their mobile devices.π Read
via "Krebs on Security".
Krebs on Security
How 1-Time Passcodes Became a Corporate Liability
Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some of the world's largest technology companies and customer support firms. A recent spate of SMS phishing attacks fromβ¦
π΄ Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware π΄
π Read
via "Dark Reading".
Nearly half of respondents say their company relies on outdated backup and recovery infrastructure β in some cases dating back to the 1990s, before today's sophisticated cyberattacks.π Read
via "Dark Reading".
Dark Reading
Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware
Nearly half of respondents say their company relies on outdated backup and recovery infrastructure β in some cases dating back to the 1990s, before today's sophisticated cyberattacks.
ποΈ Log4Shell legacy? Patching times plummet for most critical vulnerabilities β report ποΈ
π Read
via "The Daily Swig".
Trustwave report also finds 2022 is set to surpass 2021 for volume of critical CVEsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Log4Shell legacy? Patching times plummet for most critical vulnerabilities β report
Trustwave report also finds 2022 is set to surpass 2021 for volume of critical CVEs
π Zeek 5.0.1 π
π Read
via "Packet Storm Security".
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
Zeek 5.0.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Watering Hole Attacks Push ScanBox Keylogger β
π Read
via "Threat Post".
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.π Read
via "Threat Post".
Threat Post
Watering Hole Attacks Push ScanBox Keylogger
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.