πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.2K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Microsoft confirms zero-day exploits against Exchange Server in β€˜limited’ attacks πŸ—“οΈ

β€˜ProxyNotShell’ abuse less severe than 2021 attack wave due to authentication requirement

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-40123 β€Ό

mojoPortal v2.7 was discovered to contain a path traversal vulnerability via the "f" parameter at /DesignTools/CssEditor.aspx. This vulnerability allows authenticated attackers to read arbitrary files in the system.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘2
β€Ό CVE-2022-40922 β€Ό

A vulnerability in the LIEF::MachO::BinaryParser::init_and_parse function of LIEF v0.12.1 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted MachO file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38817 β€Ό

Dapr Dashboard v0.1.0 through v0.10.0 is vulnerable to Incorrect Access Control that allows attackers to obtain sensitive data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36551 β€Ό

A Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the system. Furthermore, self-registration is enabled by default in these versions of Label Studio enabling a remote attacker to create a new account and then exploit the SSRF.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32173 β€Ό

In OrchardCore rc1-11259 to v1.2.2 vulnerable to HTML injection, allow an authenticated user with an editor security role to inject a persistent HTML modal dialog component into the dashboard that will affect admin users.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Name That Edge Toon: Mumbo Dumbo πŸ•΄

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-33882 β€Ό

Under certain conditions, an attacker could create an unintended sphere of control through a vulnerability present in file delete operation in Autodesk desktop app (ADA). An attacker could leverage this vulnerability to escalate privileges and execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41443 β€Ό

phpipam v1.5.0 was discovered to contain a header injection vulnerability via the component /admin/subnets/ripe-query.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42247 β€Ό

pfSense v2.5.2 was discovered to contain a cross-site scripting (XSS) vulnerability in the browser.php component. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into a file name.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Bumblebee Malware Loader's Payloads Significantly Vary by Victim System πŸ•΄

On some systems the malware drops infostealers and banking Trojans; on others it installs sophisticated post-compromise tools, new analysis shows.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Vice Society Publishes LA Public School Student Data, Psych Evals πŸ•΄

After a flat refusal to pay the ransom, Los Angeles Unified School District's stolen data has been dumped on the Dark Web by a ransomware gang.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ First 72 Hours of Incident Response Critical to Taming Cyberattack Chaos πŸ•΄

Responding to cyberattacks is extraordinarily stressful, but better planning, frequent practice, and the availability of mental health services can help IR professionals, a survey finds.

πŸ“– Read

via "Dark Reading".
πŸ‘2
⚠ Scammers and rogue callers – can anything ever stop them? ⚠

Some thoughts for Cybersecurity Awareness Month: Is is worth reporting nuisance calls? Is it even worth reporting outright scams?

πŸ“– Read

via "Naked Security".
πŸ‘2
πŸ—“οΈ Researchers net $46k for Akamai misconfiguration vulnerability πŸ—“οΈ

A lesson in how to achieve maximum value for your discoveries

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ JavaScript sandbox vm2 remediates remote code execution risk πŸ—“οΈ

Affected firms alerted to bug whose potential impact is heightened by vm2’s use in production environments

πŸ“– Read

via "The Daily Swig".
πŸ‘1
πŸ•΄ Aryaka Delivers Zero-Trust WAN Based on Unified SASE Architecture πŸ•΄

The new offering integrates firewall-as-a-service and secure web gateway into cloud-managed networking and security services.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Tidal Cyber Closes $4M Funding Round To Expand Threat-Informed Defense Tech πŸ•΄

.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Ransomware 3.0: The Next Frontier πŸ•΄

Attackers are already circling back to reselling stolen data instead of β€” and in addition to β€” extortion.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ Eclypsium Raises Series B to Protect Digital Supply Chain As Attacks Grow πŸ•΄

The new round highlights market demand to protect global businesses from soaring breaches through supply chains of critical hardware, devices, firmware, and software.

πŸ“– Read

via "Dark Reading".
πŸ•΄ More Than 30% of All Malicious Attacks Target Shadow APIs πŸ•΄

New research spotlights how attackers are capitalizing on API-driven innovation.

πŸ“– Read

via "Dark Reading".