πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-38116 β€Ό

Le-yan Personnel and Salary Management System has hard-coded database account and password within the website source code. An unauthenticated remote attacker can access, modify system data or disrupt service.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-25887 β€Ό

The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-2330 β€Ό

Improper Restriction of XML External Entity Reference vulnerability in DLP Endpoint for Windows prior to 11.9.100 and 11.6.600 allows a remote attacker to cause the DLP Agent to access a local service that the attacker wouldn't usually have access to via a carefully constructed XML file, which the DLP Agent doesn't parse correctly.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38118 β€Ό

OAKlouds Portal websiteÒ€ℒs Meeting Room has insufficient validation for user input. A remote attacker with general user privilege can perform SQL-injection to access, modify, delete database, perform system operations and disrupt service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25857 β€Ό

The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26528 β€Ό

Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the length of segmented packetsÒ€ℒ shift parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Graph-based JavaScript bug scanner discovers more than 100 zero-day vulnerabilities in Node.js libraries πŸ—“οΈ

ODGen tool was presented at this year’s Usenix Security Symposium

πŸ“– Read

via "The Daily Swig".
⚠ LastPass source code breach – do we still recommend password managers? ⚠

What does the recent LastPass breach mean for password managers? Just a bump in the road, or a reason to ditch them entirely?

πŸ“– Read

via "Naked Security".
πŸ‘1
β€Ό CVE-2022-3063 β€Ό

Cross-site Scripting (XSS) - Generic in GitHub repository nuxt/framework prior to -.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ A Peek Into CISA's Post-Quantum Cryptography Roadmap πŸ•΄

To help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cerberus Sentinel Announces Acquisition of CUATROi πŸ•΄

US cybersecurity services firm expands services in Latin America.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ Building a Strong SOC Starts With People πŸ•΄

A people-first approach reduces fatigue and burnout, and it empowers employees to seek out development opportunities, which helps retention.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Phishing Campaign Targets PyPI Users to Distribute Malicious Code πŸ•΄

The first-of-its-kind campaign threatens to remove code packages if developers don’t submit their code to a "validation" process.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ How 1-Time Passcodes Became a Corporate Liability β™ŸοΈ

Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some of the world's largest technology companies and customer support firms. A recent spate of SMS phishing attacks from one cybercriminal group has spawned a flurry of breach disclosures from affected companies, which are all struggling to combat the same lingering security threat: The ability of scammers to interact directly with employees through their mobile devices.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware πŸ•΄

Nearly half of respondents say their company relies on outdated backup and recovery infrastructure β€” in some cases dating back to the 1990s, before today's sophisticated cyberattacks.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Log4Shell legacy? Patching times plummet for most critical vulnerabilities – report πŸ—“οΈ

Trustwave report also finds 2022 is set to surpass 2021 for volume of critical CVEs

πŸ“– Read

via "The Daily Swig".
πŸ›  Zeek 5.0.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
❌ Watering Hole Attacks Push ScanBox Keylogger ❌

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-37149 β€Ό

WAVLINK WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability when operating the file adm.cgi. This vulnerability allows attackers to execute arbitrary commands via the username parameter.

πŸ“– Read

via "National Vulnerability Database".
⚠ JavaScript bugs aplenty in Node.js ecosystem – found automatically ⚠

How to get the better of bugs in all the possible packages in your supply chain?

πŸ“– Read

via "Naked Security".
πŸ•΄ Security Culture: An OT Survival Story πŸ•΄

The relationship between information technology and operational technology will need top-down support if a holistic security culture is to truly thrive.

πŸ“– Read

via "Dark Reading".