πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-38298 β€Ό

Appsmith v1.7.11 was discovered to allow attackers to execute an authenticated Server-Side Request Forgery (SSRF) via redirecting incoming requests to the AWS internal metadata endpoint.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ New approach to ransomware encryption threatens to undermine cyber security strategies πŸ“’

Intermittent encryption is already in use with ransomware such as BlackCat and Qyick, and could mark a widespread shift in the threat landscape

πŸ“– Read

via "ITPro".
πŸ“’ Iranian Ministry of Intelligence sanctioned after Albania cyber attack πŸ“’

Iran faces stiff criticism from Nato, the US, and the UK for β€œincreasingly aggressive” cyber operations

πŸ“– Read

via "ITPro".
πŸ“’ Google’s Project Zero is frightening and reassuring in equal measure πŸ“’

This crack team of security researchers are doing work we should all be grateful for

πŸ“– Read

via "ITPro".
πŸ“’ Numerous HP business laptops and desktops vulnerable to publicly disclosed security bugs πŸ“’

Researchers revealed the details of the six vulnerabilities at Black Hat in August but many laptops, desktops, and workstations remain vulnerable

πŸ“– Read

via "ITPro".
πŸ“’ A breakdown of iOS 16's security features πŸ“’

Digital passkeys, faster security updates and a 15-minute window to fix or recall iMessages and emails

πŸ“– Read

via "ITPro".
πŸ“’ What is your digital footprint? πŸ“’

Your digital footprint is always growing – so we explore how you can keep it under control

πŸ“– Read

via "ITPro".
πŸ‘2
πŸ“’ CISA warns against actively exploited Chrome and D-Link security flaws πŸ“’

The agency has made it imperative for all FCEB agencies to patch their systems before September 29

πŸ“– Read

via "ITPro".
β€Ό CVE-2022-38616 β€Ό

SmartVista SVFE2 v2.2.22 was discovered to contain a SQL injection vulnerability via the UserForm:j_id90 parameter at /feegroups/tgrt_group.jsf.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Lorenz Ransomware Goes After SMBs via Mitel VoIP Phone Systems πŸ•΄

The ransomware gang has been seen exploiting a Mitel RCE flaw discovered in VoIP devices in April (and patched in July) to perform double-extortion attacks.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Let’s Encrypt builds infrastructure to support browser-based certificate revocation revival πŸ—“οΈ

CRLs are back, baby!

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2022-36779 β€Ό

PROSCEND - PROSCEND / ADVICE .Ltd - G/5G Industrial Cellular Router (with GPS)4 Unauthenticated OS Command Injection Proscend M330-w / M33-W5 / M350-5G / M350-W5G / M350-6 / M350-W6 / M301-G / M301-GW ADVICE ICR 111WG / https://www.proscend.com/en/category/industrial-Cellular-Router/industrial-Cellular-Router.html https://cdn.shopify.com/s/files/1/0036/9413/3297/files/ADVICE_Industrial_4G_LTE_Cellular_Router_ICR111WG.pdf?v=1620814301

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36385 β€Ό

A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from maliciously modifying firmware and performing a drive-by attack to load the firmware on any CMS8000 device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38541 β€Ό

Archery v1.8.3 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the my2sql interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36782 β€Ό

Pal Electronics Systems - Pal Gate Authorization Errors. The vulnerability is an authorization problem in PalGate device management android client app. Gates of bulidings and parking lots with a simple button in any smartphone. The API was found after a decompiling and static research using Jadx, and a dynamic analasys using Frida. The attacker can iterate over all the IOT devices to see every entry and exit, on every gate and device all over the world, he can also scrape the server and create a user's DB with full names and phone number of over 2.8 million users, and to see all of the users' movement in and out of gates, even in real time.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38069 β€Ό

Multiple globally default credentials exist across all CMS8000 devices, that once exposed, allow a threat actor with momentary physical access to gain privileged access to any device. Privileged credential access enables the extraction of sensitive patient information or modification of device parameters

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2990 β€Ό

An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38538 β€Ό

Archery v1.7.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the checksum parameter in the report module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38139 β€Ό

Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in RD Station plugin <= 5.1.3 at WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36778 β€Ό

insert HTML / js code inside input how to get to the vulnerable input : Workers &gt; worker nickname &gt; inject in this input the code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2989 β€Ό

An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

πŸ“– Read

via "National Vulnerability Database".