๐ด Unpatched Zimbra Platforms Are Probably Compromised, CISA Says ๐ด
๐ Read
via "Dark Reading".
Attackers are targeting Zimbra systems in the public and private sectors, looking to exploit multiple vulnerabilities, CISA says.๐ Read
via "Dark Reading".
Dark Reading
Unpatched Zimbra Platforms Are Probably Compromised, CISA Says
Attackers are targeting Zimbra systems in the public and private sectors, looking to exploit multiple vulnerabilities, CISA says.
๐1
๐ด Australia Declares War on Cybercrime Syndicates ๐ด
๐ Read
via "Dark Reading".
An international counter-ransomware task force has been announced by Australian authorities following the recent Optus and Medibank data breaches.๐ Read
via "Dark Reading".
Dark Reading
Australia Declares War on Cybercrime Syndicates
An international counter-ransomware task force has been announced by Australian authorities following the recent Optus and Medibank data breaches.
๐คฏ2๐1
๐ด Researchers Sound Alarm on Dangerous BatLoader Malware Dropper ๐ด
๐ Read
via "Dark Reading".
BatLoader has spread rapidly to roost in systems globally, tailoring payloads to its victims.๐ Read
via "Dark Reading".
Dark Reading
Researchers Sound Alarm on Dangerous BatLoader Malware Dropper
BatLoader has spread rapidly to roost in systems globally, tailoring payloads to its victims.
๐1๐ค1
๐ด Evolving Security for Government Multiclouds ๐ด
๐ Read
via "Dark Reading".
As the threat landscape increases, public cloud security needs to evolve.๐ Read
via "Dark Reading".
Dark Reading
Evolving Security for Government Multiclouds
As the threat landscape increases, public cloud security needs to evolve.
๐๏ธ Mastodon users vulnerable to password-stealing attacks ๐๏ธ
๐ Read
via "The Daily Swig".
Patched bug could have leaked credentials๐ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Mastodon users vulnerable to password-stealing attacks
Patched bug could have leaked credentials
๐ด Nasty SQL Injection Bug in Zendesk Endangers Sensitive Customer Data ๐ด
๐ Read
via "Dark Reading".
The API-related vulnerabilities put conversations, email addresses, tickets, and more in danger of exposure via the Zendesk Explore reporting service.๐ Read
via "Dark Reading".
Dark Reading
Nasty SQL Injection Bug in Zendesk Endangers Sensitive Customer Data
The API-related vulnerabilities put conversations, email addresses, tickets, and more in danger of exposure via the Zendesk Explore reporting service.
๐ด Yakima Neighborhood Health Services Notice of Data Security Incident ๐ด
๐ Read
via "Dark Reading".
.๐ Read
via "Dark Reading".
Dark Reading
Yakima Neighborhood Health Services Notice of Data Security Incident
.
๐ด Red Canary Provides First-Ever MITRE Engenuityโข ATT&CKยฎ Evaluations for Managed Services ๐ด
๐ Read
via "Dark Reading".
.๐ Read
via "Dark Reading".
Dark Reading
Red Canary Provides First-Ever MITRE Engenuityโข ATT&CKยฎ Evaluations for Managed Services
.
โ๏ธ Top Zeus Botnet Suspect โTankโ Arrested in Geneva โ๏ธ
๐ Read
via "Krebs on Security".
Vyacheslav โTankโ Penchukov, the accused 40-year-old Ukrainian leader of a prolific cybercriminal group that stole tens of millions of dollars from small to mid-sized businesses in the United States and Europe, has been arrested in Switzerland, according to multiple sources.๐ Read
via "Krebs on Security".
Krebs on Security
Top Zeus Botnet Suspect โTankโ Arrested in Geneva
Vyacheslav โTankโ Penchukov, the accused 40-year-old Ukrainian leader of a prolific cybercriminal group that stole tens of millions of dollars from small to mid-sized businesses in the United States and Europe, has been arrested in Switzerland, accordingโฆ
๐๏ธ Zendesk Explore flaws opened the door to account pillage ๐๏ธ
๐ Read
via "The Daily Swig".
Patched SQLi and logical access vulnerabilities posed serious risk๐ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Zendesk Explore flaws opened the door to account pillage
Patched SQLi and logical access vulnerabilities posed serious risk
๐ด Google Forks Over $391.5M in Record-Setting US Consumer Privacy Settlement ๐ด
๐ Read
via "Dark Reading".
A misleading location-tracking practice ensnared the search-engine giant in massive privacy case spanning 40 states.๐ Read
via "Dark Reading".
Dark Reading
Google Forks Over $391.5M in Record-Setting US Consumer Privacy Settlement
A misleading location-tracking practice ensnared the search-engine giant in massive privacy case spanning 40 states.
โ โGucci Masterโ business email scammer Hushpuppi gets 11 years โ
๐ Read
via "Naked Security".
Learn how to protect yourself from big-money tricksters like the Hushpuppis of the world...๐ Read
via "Naked Security".
Naked Security
โGucci Masterโ business email scammer Hushpuppi gets 11 years
Learn how to protect yourself from big-money tricksters like the Hushpuppis of the worldโฆ
๐ด How Routine Pen Testing Can Reveal the Unseen Flaws in Your Cybersecurity Posture ๐ด
๐ Read
via "Dark Reading".
Testing is an ongoing mission, not a one-and-done fix.๐ Read
via "Dark Reading".
Dark Reading
How Routine Pen Testing Can Reveal the Unseen Flaws in Your Cybersecurity Posture
Testing is an ongoing mission, not a one-and-done fix.
โ Log4Shell-like code execution hole in popular Backstage dev tool โ
๐ Read
via "Naked Security".
Researchers at cloud coding security company Oxeye have written up a critical bug that they recently discovered in the popular cloud development toolkit Backstage. Their report includes an explanation of how the bug works, plus proof-of-concept (PoC) code showing how to exploit it. Backstage is whatโs known as a cloud developer portal โ a sort [โฆ]๐ Read
via "Naked Security".
Naked Security
Log4Shell-like code execution hole in popular Backstage dev tool
Good old โstring templatingโ, also known as โstring interpolationโ, in the spotlight againโฆ
๐ด Where Can Third-Party Governance and Risk Management Take Us? ๐ด
๐ Read
via "Dark Reading".
Part 2 in our series addressing the top 10 unanswered questions in security: How will TPGRM evolve?๐ Read
via "Dark Reading".
Dark Reading
Where Can Third-Party Governance and Risk Management Take Us?
Part 2 in our series addressing the top 10 unanswered questions in security: How will TPGRM evolve?
๐ด Wipermania: Malware Remains a Potent Threat, 10 Years Since 'Shamoon' ๐ด
๐ Read
via "Dark Reading".
An in-depth analysis of system-destroying malware families presented at Black Hat Middle East & Africa shows a growing nuance in terms of how they're deployed.๐ Read
via "Dark Reading".
Dark Reading
Wipermania: Malware Remains a Potent Threat, 10 Years Since 'Shamoon'
An in-depth analysis of system-destroying malware families presented at Black Hat Middle East & Africa shows a growing nuance in terms of how they're deployed.
๐2
โผ CVE-2022-34313 โผ
๐ Read
via "National Vulnerability Database".
IBM CICS TX 11.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. X-Force ID: 229449.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-2450 โผ
๐ Read
via "National Vulnerability Database".
The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 lacks authorization in various AJAX actions, allowing any logged-in users, such as subscribers to call them.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-40405 โผ
๐ Read
via "National Vulnerability Database".
WoWonder Social Network Platform v4.1.2 was discovered to contain a SQL injection vulnerability via the offset parameter at requests.php?f=load-my-blogs.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-3965 โผ
๐ Read
via "National Vulnerability Database".
A vulnerability classified as problematic was found in ffmpeg. This vulnerability affects the function smc_encode_stream of the file libavcodec/smcenc.c of the component QuickTime Graphics Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. The attack can be initiated remotely. The name of the patch is 13c13109759090b7f7182480d075e13b36ed8edd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213544.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-33983 โผ
๐ Read
via "National Vulnerability Database".
DMA transactions which are targeted at input buffers used for the NvmExpressLegacy software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the NvmExpressLegacy driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. This issue was fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022053๐ Read
via "National Vulnerability Database".