βΌ CVE-2022-38298 βΌ
π Read
via "National Vulnerability Database".
Appsmith v1.7.11 was discovered to allow attackers to execute an authenticated Server-Side Request Forgery (SSRF) via redirecting incoming requests to the AWS internal metadata endpoint.π Read
via "National Vulnerability Database".
π’ New approach to ransomware encryption threatens to undermine cyber security strategies π’
π Read
via "ITPro".
Intermittent encryption is already in use with ransomware such as BlackCat and Qyick, and could mark a widespread shift in the threat landscapeπ Read
via "ITPro".
IT PRO
New approach to ransomware encryption threatens to undermine cyber security strategies | IT PRO
Intermittent encryption is already in use with ransomware such as BlackCat and Qyick, and could mark a widespread shift in the threat landscape
π’ Iranian Ministry of Intelligence sanctioned after Albania cyber attack π’
π Read
via "ITPro".
Iran faces stiff criticism from Nato, the US, and the UK for βincreasingly aggressiveβ cyber operationsπ Read
via "ITPro".
IT PRO
Iranian Ministry of Intelligence sanctioned after Albania cyber attack | IT PRO
Iran faces stiff criticism from Nato, the US, and the UK for βincreasingly aggressiveβ cyber operations
π’ Googleβs Project Zero is frightening and reassuring in equal measure π’
π Read
via "ITPro".
This crack team of security researchers are doing work we should all be grateful forπ Read
via "ITPro".
IT PRO
Googleβs Project Zero is frightening and reassuring in equal measure | IT PRO
This crack team of security researchers are doing work we should all be grateful for
π’ Numerous HP business laptops and desktops vulnerable to publicly disclosed security bugs π’
π Read
via "ITPro".
Researchers revealed the details of the six vulnerabilities at Black Hat in August but many laptops, desktops, and workstations remain vulnerableπ Read
via "ITPro".
IT PRO
Numerous HP business laptops and desktops vulnerable to publicly disclosed security bugs | IT PRO
Researchers revealed the details of the six vulnerabilities at Balck Hat in August but many laptops, desktops, and workstations remain vulnerable
π’ A breakdown of iOS 16's security features π’
π Read
via "ITPro".
Digital passkeys, faster security updates and a 15-minute window to fix or recall iMessages and emailsπ Read
via "ITPro".
IT PRO
A breakdown of iOS 16's security features | IT PRO
Digital passkeys, faster security updates and a 15-minute window to fix or recall iMessages and emails
π’ What is your digital footprint? π’
π Read
via "ITPro".
Your digital footprint is always growing β so we explore how you can keep it under controlπ Read
via "ITPro".
IT PRO
What is your digital footprint? | IT PRO
Your digital footprint is always growing β so we explore how you can keep it under control
π2
π’ CISA warns against actively exploited Chrome and D-Link security flaws π’
π Read
via "ITPro".
The agency has made it imperative for all FCEB agencies to patch their systems before September 29π Read
via "ITPro".
IT PRO
CISA warns against actively exploited Chrome and D-Link security flaws | IT PRO
The agency has made it imperative for all FCEB agencies to patch their systems before September 29
βΌ CVE-2022-38616 βΌ
π Read
via "National Vulnerability Database".
SmartVista SVFE2 v2.2.22 was discovered to contain a SQL injection vulnerability via the UserForm:j_id90 parameter at /feegroups/tgrt_group.jsf.π Read
via "National Vulnerability Database".
π΄ Lorenz Ransomware Goes After SMBs via Mitel VoIP Phone Systems π΄
π Read
via "Dark Reading".
The ransomware gang has been seen exploiting a Mitel RCE flaw discovered in VoIP devices in April (and patched in July) to perform double-extortion attacks.π Read
via "Dark Reading".
Dark Reading
Lorenz Ransomware Goes After SMBs via Mitel VoIP Phone Systems
The ransomware gang has been seen exploiting a Mitel RCE flaw discovered in VoIP devices in April (and patched in July) to perform double-extortion attacks.
ποΈ Letβs Encrypt builds infrastructure to support browser-based certificate revocation revival ποΈ
π Read
via "The Daily Swig".
CRLs are back, baby!π Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Letβs Encrypt builds infrastructure to support browser-based certificate revocation revival
CRLs are back, baby!
π1
βΌ CVE-2022-36779 βΌ
π Read
via "National Vulnerability Database".
PROSCEND - PROSCEND / ADVICE .Ltd - G/5G Industrial Cellular Router (with GPS)4 Unauthenticated OS Command Injection Proscend M330-w / M33-W5 / M350-5G / M350-W5G / M350-6 / M350-W6 / M301-G / M301-GW ADVICE ICR 111WG / https://www.proscend.com/en/category/industrial-Cellular-Router/industrial-Cellular-Router.html https://cdn.shopify.com/s/files/1/0036/9413/3297/files/ADVICE_Industrial_4G_LTE_Cellular_Router_ICR111WG.pdf?v=1620814301π Read
via "National Vulnerability Database".
βΌ CVE-2022-36385 βΌ
π Read
via "National Vulnerability Database".
A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from maliciously modifying firmware and performing a drive-by attack to load the firmware on any CMS8000 device.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38541 βΌ
π Read
via "National Vulnerability Database".
Archery v1.8.3 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the my2sql interface.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36782 βΌ
π Read
via "National Vulnerability Database".
Pal Electronics Systems - Pal Gate Authorization Errors. The vulnerability is an authorization problem in PalGate device management android client app. Gates of bulidings and parking lots with a simple button in any smartphone. The API was found after a decompiling and static research using Jadx, and a dynamic analasys using Frida. The attacker can iterate over all the IOT devices to see every entry and exit, on every gate and device all over the world, he can also scrape the server and create a user's DB with full names and phone number of over 2.8 million users, and to see all of the users' movement in and out of gates, even in real time.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38069 βΌ
π Read
via "National Vulnerability Database".
Multiple globally default credentials exist across all CMS8000 devices, that once exposed, allow a threat actor with momentary physical access to gain privileged access to any device. Privileged credential access enables the extraction of sensitive patient information or modification of device parametersπ Read
via "National Vulnerability Database".
βΌ CVE-2022-2990 βΌ
π Read
via "National Vulnerability Database".
An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38538 βΌ
π Read
via "National Vulnerability Database".
Archery v1.7.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the checksum parameter in the report module.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38139 βΌ
π Read
via "National Vulnerability Database".
Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in RD Station plugin <= 5.1.3 at WordPress.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36778 βΌ
π Read
via "National Vulnerability Database".
insert HTML / js code inside input how to get to the vulnerable input : Workers > worker nickname > inject in this input the code.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2989 βΌ
π Read
via "National Vulnerability Database".
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.π Read
via "National Vulnerability Database".