πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ JavaScript bugs aplenty in Node.js ecosystem – found automatically ⚠

How to get the better of bugs in all the possible packages in your supply chain?

πŸ“– Read

via "Naked Security".
⚠ Chrome patches 24 security holes, enables β€œSanitizer” safety system ⚠

24 existing bugs fixed. And, we hope, numerous potential future bugs prevented.

πŸ“– Read

via "Naked Security".
❌ Student Loan Breach Exposes 2.5M Records ❌

2.5 million people were affected, in a breach that could spell more trouble down the line.

πŸ“– Read

via "Threat Post".
πŸ•΄ SecureAuth Announces General Availability of Arculix, Its Next-Gen Passwordless, Continuous-Authentication Platform πŸ•΄

Next-gen platform delivers adaptive and robust, continuous authentication with identity orchestration and a frictionless user experience.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Inevitability of Cloud Breaches: Tales of Real-World Cloud Attacks πŸ•΄

While cloud breaches are going to happen, that doesn't mean we can't do anything about them. By better understanding cloud attacks, organizations can better prepare for them. (First of two parts.)

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Command injection vulnerability in GitHub Pages nets bug hunter $4k πŸ—“οΈ

Exploit involved duping developers into exposing repositories with social engineering techniques

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ Three-day hackathon uncovers hundreds of bugs in Yahoo search engine tool Vespa πŸ—“οΈ

Live event brings together bug bounty hunters from across the globe

πŸ“– Read

via "The Daily Swig".
β™ŸοΈ Final Thoughts on Ubiquiti β™ŸοΈ

Last year, I posted a series of articles about a purported β€œbreach” at Ubiquiti. My sole source for that reporting was the person who has since been indicted by federal prosecutors for his alleged wrongdoing – which includes providing false… Read More Β»

πŸ“– Read

via "Krebs on Security".
πŸ•΄ TikTok for Android Bug Allows Single-Click Account Hijack πŸ•΄

A security vulnerability (CVE-2022-28799) in one of TikTok for Android's deeplinks could affect billions of users, Microsoft warns.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-36045 β€Ό

NodeBB Forum Software is powered by Node.js and supports either Redis, MongoDB, or a PostgreSQL database. It utilizes web sockets for instant interactions and real-time notifications. `utils.generateUUID`, a helper function available in essentially all versions of NodeBB (as far back as v1.0.1 and potentially earlier) used a cryptographically insecure Pseudo-random number generator (`Math.random()`), which meant that a specially crafted script combined with multiple invocations of the password reset functionality could enable an attacker to correctly calculate the reset code for an account they do not have access to. This vulnerability impacts all installations of NodeBB. The vulnerability allows for an attacker to take over any account without the involvement of the victim, and as such, the remediation should be applied immediately (either via NodeBB upgrade or cherry-pick of the specific changeset. The vulnerability has been patched in version 2.x and 1.19.x. There is no known workaround, but the patch sets listed above will fully patch the vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36035 β€Ό

Flux is a tool for keeping Kubernetes clusters in sync with sources of configuration (like Git repositories), and automating updates to configuration when there is new code to deploy. Flux CLI allows users to deploy Flux components into a Kubernetes cluster via command-line. The vulnerability allows other applications to replace the Flux deployment information with arbitrary content which is deployed into the target Kubernetes cluster instead. The vulnerability is due to the improper handling of user-supplied input, which results in a path traversal that can be controlled by the attacker. Users sharing the same shell between other applications and the Flux CLI commands could be affected by this vulnerability. In some scenarios no errors may be presented, which may cause end users not to realize that something is amiss. A safe workaround is to execute Flux CLI in ephemeral and isolated shell environments, which can ensure no persistent values exist from previous processes. However, upgrading to the latest version of the CLI is still the recommended mitigation strategy.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ (ISC)Β² Opens Global Enrollment for '1 Million Certified in Cybersecurity' Initiative πŸ•΄

(ISC)Β² pledges to expand and diversify the cybersecurity workforce by providing free "(ISC)Β² Certified in Cybersecurity" education and exams to 1 million people worldwide.

πŸ“– Read

via "Dark Reading".
πŸ•΄ OpenText Goes All-in on Cybersecurity Size and Scale With Micro Focus Purchase πŸ•΄

OpenText makes a $6 billion bet that bigger is better in security and that cybersecurity platform plays are the future.

πŸ“– Read

via "Dark Reading".
πŸ•΄ James Webb Telescope Images Loaded With Malware Are Evading EDR πŸ•΄

New Golang cyberattacks use deep space images and a new obfuscator to target systems β€” undetected.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-1319 β€Ό

A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1271 β€Ό

An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35537 β€Ό

In gcc, a crafted input source file could cause g++ to crash during compilation when provided certain optimization flags. The problem resides in the ipcp_store_vr_results function in gcc/ipa-cp.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2520 β€Ό

A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1405 β€Ό

CNCSoft: All versions prior to 1.01.32 does not properly sanitize input while processing a specific project file, allowing a possible stack-based buffer overflow condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2759 β€Ό

Delta Electronics Delta Robot Automation Studio (DRAS) versions prior to 1.13.20 are affected by improper restrictions where the software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. This may allow an attacker to view sensitive documents and information on the affected host.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2758 β€Ό

All versions of LS Industrial Systems (LSIS) Co. Ltd LS Electric PLCs and XG5000 PLC programming software are affected where passwords are not adequately encrypted during the communication process between the XG5000 software and the affected PLC. This would allow an attacker to identify and decrypt the affected PLCÒ€ℒs password by sniffing the traffic.

πŸ“– Read

via "National Vulnerability Database".