πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-20955 β€Ό

Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20822 β€Ό

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to read and delete files on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains certain character sequences to an affected system. A successful exploit could allow the attacker to read or delete specific files on the device that their configured administrative level should not have access to. Cisco plans to release software updates that address this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20811 β€Ό

Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
⚠ Online ticketing company β€œSee” pwned for 2.5 years by attackers ⚠

Don't be a cybersecurity slowcoach - you need to spot possible attacks as soon as you can.

πŸ“– Read

via "Naked Security".
πŸ•΄ Ransomware Gangs Ramp Up Industrial Attacks in US πŸ•΄

The manufacturing segment was especially hard hit by cyberattacks in the third quarter of 2022.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Why Retail Stores Are More Vulnerable Than Ever to Cybercrime πŸ•΄

When we think about cybercrime and retail it is natural to focus on websites being targeted with attacks. Indeed, there has been a shocking rise in the number of cyberattacks perpetrated against online retailers in the past year. Dakota Murphey explains why store owners and security managers need to also protect their physical locations from the cyber threat, too, however.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-3705 β€Ό

A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3704 β€Ό

A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39348 β€Ό

Twisted is an event-based framework for internet applications. Started with version 0.9.4, when the host header does not match a configured host `twisted.web.vhost.NameVirtualHost` will return a `NoResource` resource which renders the Host header unescaped into the 404 response allowing HTML and script injection. In practice this should be very difficult to exploit as being able to modify the Host header of a normal HTTP request implies that one is already in a privileged position. This issue was fixed in version 22.10.0rc1. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40703 β€Ό

CWE-302 Authentication Bypass by Assumed-Immutable Data in AliveCor Kardia App version 5.17.1-754993421 and prior on Android allows an unauthenticated attacker with physical access to the Android device containing the app to bypass application authentication and alter information in the app.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3363 β€Ό

Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.0a7.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39355 β€Ό

Discourse Patreon enables syncronization between Discourse Groups and Patreon rewards. On sites with Patreon login enabled, an improper authentication vulnerability could be used to take control of a victim's forum account. This vulnerability is patched in commit number 846d012151514b35ce42a1636c7d70f6dcee879e of the discourse-patreon plugin. Out of an abundance of caution, any Discourse accounts which have logged in with an unverified-email Patreon account will be logged out and asked to verify their email address on their next login. As a workaround, disable the patreon integration and log out all users with associated Patreon accounts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39286 β€Ό

Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in CWD. This vulnerability allows one user to run code as another. Version 4.11.2 contains a patch for this issue. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Hive ransomware group claims cyber attack on India’s Tata Power πŸ“’

The Indian energy company reported last week that its IT systems were down, with customers reporting difficulties in paying their bills

πŸ“– Read

via "ITPro".
πŸ“’ The ultimate guide to deleting yourself from social media πŸ“’

Worried about oversharing – or just want to kick the social media habit? We’ve outlined concrete steps you can take to delete your identity from the most popular sites and services

πŸ“– Read

via "ITPro".
πŸ“’ ExtraHop partners with Splunk SOAR to offer visibility into encrypted network traffic πŸ“’

The new platform integration aims to reduce the amount of time security professionals spend on low-level analysis tasks

πŸ“– Read

via "ITPro".
πŸ“’ Palo Alto Networks expands NextWave partner network πŸ“’

The revamped initiative aims to help partners deliver incident response services built on Cortex XDR

πŸ“– Read

via "ITPro".
πŸ“’ A strategic guide for controlling and securing your data πŸ“’

Forrester's data security control framework

πŸ“– Read

via "ITPro".
πŸ“’ FTC orders Uber-owned Drizly to improve "lax" data protection approach following 2020 breach πŸ“’

The Uber subsidiary has been hit with an FTC complaint, as the agency looks to send a message to the wider industry

πŸ“– Read

via "ITPro".
πŸ“’ What is secure deletion? πŸ“’

Want to ensure your deleted data can’t be recovered and abused? We explore how secure deletion works, and how you can best protect your information

πŸ“– Read

via "ITPro".
πŸ“’ Database and big data security πŸ“’

KuppingerCole 2021 Leadership Compass Report

πŸ“– Read

via "ITPro".