π΄ Cerberus Sentinel Announces Acquisition of CUATROi π΄
π Read
via "Dark Reading".
US cybersecurity services firm expands services in Latin America.π Read
via "Dark Reading".
Dark Reading
Cerberus Sentinel Announces Acquisition of CUATROi
US cybersecurity services firm expands services in Latin America.
π1
π΄ Building a Strong SOC Starts With People π΄
π Read
via "Dark Reading".
A people-first approach reduces fatigue and burnout, and it empowers employees to seek out development opportunities, which helps retention.π Read
via "Dark Reading".
Dark Reading
Building a Strong SOC Starts With People
A people-first approach reduces fatigue and burnout, and it empowers employees to seek out development opportunities, which helps retention.
π΄ Phishing Campaign Targets PyPI Users to Distribute Malicious Code π΄
π Read
via "Dark Reading".
The first-of-its-kind campaign threatens to remove code packages if developers donβt submit their code to a "validation" process.π Read
via "Dark Reading".
Dark Reading
Phishing Campaign Targets PyPI Users to Distribute Malicious Code
The first-of-its-kind campaign threatens to remove code packages if developers donβt submit their code to a "validation" process.
βοΈ How 1-Time Passcodes Became a Corporate Liability βοΈ
π Read
via "Krebs on Security".
Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some of the world's largest technology companies and customer support firms. A recent spate of SMS phishing attacks from one cybercriminal group has spawned a flurry of breach disclosures from affected companies, which are all struggling to combat the same lingering security threat: The ability of scammers to interact directly with employees through their mobile devices.π Read
via "Krebs on Security".
Krebs on Security
How 1-Time Passcodes Became a Corporate Liability
Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some of the world's largest technology companies and customer support firms. A recent spate of SMS phishing attacks fromβ¦
π΄ Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware π΄
π Read
via "Dark Reading".
Nearly half of respondents say their company relies on outdated backup and recovery infrastructure β in some cases dating back to the 1990s, before today's sophisticated cyberattacks.π Read
via "Dark Reading".
Dark Reading
Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware
Nearly half of respondents say their company relies on outdated backup and recovery infrastructure β in some cases dating back to the 1990s, before today's sophisticated cyberattacks.
ποΈ Log4Shell legacy? Patching times plummet for most critical vulnerabilities β report ποΈ
π Read
via "The Daily Swig".
Trustwave report also finds 2022 is set to surpass 2021 for volume of critical CVEsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Log4Shell legacy? Patching times plummet for most critical vulnerabilities β report
Trustwave report also finds 2022 is set to surpass 2021 for volume of critical CVEs
π Zeek 5.0.1 π
π Read
via "Packet Storm Security".
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
Zeek 5.0.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Watering Hole Attacks Push ScanBox Keylogger β
π Read
via "Threat Post".
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.π Read
via "Threat Post".
Threat Post
Watering Hole Attacks Push ScanBox Keylogger
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
βΌ CVE-2022-37149 βΌ
π Read
via "National Vulnerability Database".
WAVLINK WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability when operating the file adm.cgi. This vulnerability allows attackers to execute arbitrary commands via the username parameter.π Read
via "National Vulnerability Database".
β JavaScript bugs aplenty in Node.js ecosystem β found automatically β
π Read
via "Naked Security".
How to get the better of bugs in all the possible packages in your supply chain?π Read
via "Naked Security".
Naked Security
JavaScript bugs aplenty in Node.js ecosystem β found automatically
How to get the better of bugs in all the possible packages in your supply chain?
π΄ Security Culture: An OT Survival Story π΄
π Read
via "Dark Reading".
The relationship between information technology and operational technology will need top-down support if a holistic security culture is to truly thrive.π Read
via "Dark Reading".
Dark Reading
Security Culture: An OT Survival Story
The relationship between information technology and operational technology will need top-down support if a holistic security culture is to truly thrive.
π΄ Chinese Hackers Target Energy Sector in Australia, South China Sea π΄
π Read
via "Dark Reading".
The phishing campaign deploying a ScanBox reconnaissance framework has targeted the Australian government and companies maintaining wind turbines in the South China Sea.π Read
via "Dark Reading".
Dark Reading
Chinese Hackers Target Energy Sector in Australia, South China Sea
The phishing campaign deploying a ScanBox reconnaissance framework has targeted the Australian government and companies maintaining wind turbines in the South China Sea.
βΌ CVE-2022-37176 βΌ
π Read
via "National Vulnerability Database".
Tenda AC6(AC1200) v5.0 Firmware v02.03.01.114 and below contains a vulnerability which allows attackers to remove the Wi-Fi password and force the device into open security mode via a crafted packet sent to goform/setWizard.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36552 βΌ
π Read
via "National Vulnerability Database".
Tenda AC6(AC1200) v5.0 Firmware v02.03.01.114 and below contains an issue in the component /cgi-bin/DownloadFlash which allows attackers to steal all data such as source code and system files via a crafted GET request.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37237 βΌ
π Read
via "National Vulnerability Database".
An attacker can send malicious RTMP requests to make the ZLMediaKit server crash remotely. Affected version is below commit 7d8b212a3c3368bc2f6507cb74664fc419eb9327.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29864 βΌ
π Read
via "National Vulnerability Database".
IBM Security Identity Manager 6.0 and 6.0.2 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 206089π Read
via "National Vulnerability Database".
π΄ Don't Let 'Perfect' Be the Enemy of a Good AppSec Program π΄
π Read
via "Dark Reading".
These five suggestions provide a great place to start building a scalable and affordable program for creating secure apps.π Read
via "Dark Reading".
Dark Reading
Don't Let 'Perfect' Be the Enemy of a Good AppSec Program
These five suggestions provide a great place to start building a scalable and affordable program for creating secure apps.
π΄ New ODGen Tool Unearths 180 Zero-Days in Node.js Libraries π΄
π Read
via "Dark Reading".
New graph-based tool offers a better alternative to current approaches for finding vulnerabilities in JavaScript code, they note.π Read
via "Dark Reading".
Dark Reading
New ODGen Tool Unearths 180 Zero-Days in Node.js Libraries
New graph-based tool offers a better alternative to current approaches for finding vulnerabilities in JavaScript code, they note.
βΌ CVE-2022-36563 βΌ
π Read
via "National Vulnerability Database".
Incorrect access control in the install directory (C:\RailsInstaller) of Rubyinstaller2 v3.1.2 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34368 βΌ
π Read
via "National Vulnerability Database".
Dell EMC NetWorker 19.2.1.x 19.3.x, 19.4.x, 19.5.x, 19.6.x and 19.7.0.0 contain an Improper Handling of Insufficient Permissions or Privileges vulnerability. Authenticated non admin user could exploit this vulnerability and gain access to restricted resources.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36561 βΌ
π Read
via "National Vulnerability Database".
XPDF v4.0.4 was discovered to contain a segmentation violation via the component /xpdf/AcroForm.cc:538.π Read
via "National Vulnerability Database".