๐ด Red Canary Provides First-Ever MITRE Engenuityโข ATT&CKยฎ Evaluations for Managed Services ๐ด
๐ Read
via "Dark Reading".
.๐ Read
via "Dark Reading".
Dark Reading
Red Canary Provides First-Ever MITRE Engenuityโข ATT&CKยฎ Evaluations for Managed Services
.
โ๏ธ Top Zeus Botnet Suspect โTankโ Arrested in Geneva โ๏ธ
๐ Read
via "Krebs on Security".
Vyacheslav โTankโ Penchukov, the accused 40-year-old Ukrainian leader of a prolific cybercriminal group that stole tens of millions of dollars from small to mid-sized businesses in the United States and Europe, has been arrested in Switzerland, according to multiple sources.๐ Read
via "Krebs on Security".
Krebs on Security
Top Zeus Botnet Suspect โTankโ Arrested in Geneva
Vyacheslav โTankโ Penchukov, the accused 40-year-old Ukrainian leader of a prolific cybercriminal group that stole tens of millions of dollars from small to mid-sized businesses in the United States and Europe, has been arrested in Switzerland, accordingโฆ
๐๏ธ Zendesk Explore flaws opened the door to account pillage ๐๏ธ
๐ Read
via "The Daily Swig".
Patched SQLi and logical access vulnerabilities posed serious risk๐ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Zendesk Explore flaws opened the door to account pillage
Patched SQLi and logical access vulnerabilities posed serious risk
๐ด Google Forks Over $391.5M in Record-Setting US Consumer Privacy Settlement ๐ด
๐ Read
via "Dark Reading".
A misleading location-tracking practice ensnared the search-engine giant in massive privacy case spanning 40 states.๐ Read
via "Dark Reading".
Dark Reading
Google Forks Over $391.5M in Record-Setting US Consumer Privacy Settlement
A misleading location-tracking practice ensnared the search-engine giant in massive privacy case spanning 40 states.
โ โGucci Masterโ business email scammer Hushpuppi gets 11 years โ
๐ Read
via "Naked Security".
Learn how to protect yourself from big-money tricksters like the Hushpuppis of the world...๐ Read
via "Naked Security".
Naked Security
โGucci Masterโ business email scammer Hushpuppi gets 11 years
Learn how to protect yourself from big-money tricksters like the Hushpuppis of the worldโฆ
๐ด How Routine Pen Testing Can Reveal the Unseen Flaws in Your Cybersecurity Posture ๐ด
๐ Read
via "Dark Reading".
Testing is an ongoing mission, not a one-and-done fix.๐ Read
via "Dark Reading".
Dark Reading
How Routine Pen Testing Can Reveal the Unseen Flaws in Your Cybersecurity Posture
Testing is an ongoing mission, not a one-and-done fix.
โ Log4Shell-like code execution hole in popular Backstage dev tool โ
๐ Read
via "Naked Security".
Researchers at cloud coding security company Oxeye have written up a critical bug that they recently discovered in the popular cloud development toolkit Backstage. Their report includes an explanation of how the bug works, plus proof-of-concept (PoC) code showing how to exploit it. Backstage is whatโs known as a cloud developer portal โ a sort [โฆ]๐ Read
via "Naked Security".
Naked Security
Log4Shell-like code execution hole in popular Backstage dev tool
Good old โstring templatingโ, also known as โstring interpolationโ, in the spotlight againโฆ
๐ด Where Can Third-Party Governance and Risk Management Take Us? ๐ด
๐ Read
via "Dark Reading".
Part 2 in our series addressing the top 10 unanswered questions in security: How will TPGRM evolve?๐ Read
via "Dark Reading".
Dark Reading
Where Can Third-Party Governance and Risk Management Take Us?
Part 2 in our series addressing the top 10 unanswered questions in security: How will TPGRM evolve?
๐ด Wipermania: Malware Remains a Potent Threat, 10 Years Since 'Shamoon' ๐ด
๐ Read
via "Dark Reading".
An in-depth analysis of system-destroying malware families presented at Black Hat Middle East & Africa shows a growing nuance in terms of how they're deployed.๐ Read
via "Dark Reading".
Dark Reading
Wipermania: Malware Remains a Potent Threat, 10 Years Since 'Shamoon'
An in-depth analysis of system-destroying malware families presented at Black Hat Middle East & Africa shows a growing nuance in terms of how they're deployed.
๐2
โผ CVE-2022-34313 โผ
๐ Read
via "National Vulnerability Database".
IBM CICS TX 11.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. X-Force ID: 229449.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-2450 โผ
๐ Read
via "National Vulnerability Database".
The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 lacks authorization in various AJAX actions, allowing any logged-in users, such as subscribers to call them.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-40405 โผ
๐ Read
via "National Vulnerability Database".
WoWonder Social Network Platform v4.1.2 was discovered to contain a SQL injection vulnerability via the offset parameter at requests.php?f=load-my-blogs.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-3965 โผ
๐ Read
via "National Vulnerability Database".
A vulnerability classified as problematic was found in ffmpeg. This vulnerability affects the function smc_encode_stream of the file libavcodec/smcenc.c of the component QuickTime Graphics Video Encoder. The manipulation of the argument y_size leads to out-of-bounds read. The attack can be initiated remotely. The name of the patch is 13c13109759090b7f7182480d075e13b36ed8edd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213544.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-33983 โผ
๐ Read
via "National Vulnerability Database".
DMA transactions which are targeted at input buffers used for the NvmExpressLegacy software SMI handler could cause SMRAM corruption through a TOCTOU attack. DMA transactions which are targeted at input buffers used for the software SMI handler used by the NvmExpressLegacy driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. This issue was fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25, kernel 5.5: 05.52.25 https://www.insyde.com/security-pledge/SA-2022053๐ Read
via "National Vulnerability Database".
โผ CVE-2022-42058 โผ
๐ Read
via "National Vulnerability Database".
Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain a stack overflow via the setRemoteWebManage function. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-43342 โผ
๐ Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in the Add function of Eramba GRC Software c2.8.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the KPI Title text field.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-42119 โผ
๐ Read
via "National Vulnerability Database".
Certain Liferay products are vulnerable to Cross Site Scripting (XSS) via the Commerce module. This affects Liferay Portal 7.3.5 through 7.4.2 and Liferay DXP 7.3 before update 8.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-20832 โผ
๐ Read
via "National Vulnerability Database".
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-43693 โผ
๐ Read
via "National Vulnerability Database".
Concrete CMS is vulnerable to CSRF due to the lack of "State" parameter for external Concrete authentication service for users of Concrete who use the "out of the box" core OAuth.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-41913 โผ
๐ Read
via "National Vulnerability Database".
Discourse-calendar is a plugin for the Discourse messaging platform which adds the ability to create a dynamic calendar in the first post of a topic. Members of private groups or public groups with private members can be listed by users, who can create and edit post events. This vulnerability only affects sites which have discourse post events enabled. This issue has been patched in commit `ca5ae3e7e` which will be included in future releases. Users unable to upgrade should disable the `discourse_post_event_enabled` setting to fully mitigate the issue. Also, it's possible to prevent regular users from using this vulnerability by removing all groups from the `discourse_post_event_allowed_on_groups` but note that moderators will still be able to use it.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-41917 โผ
๐ Read
via "National Vulnerability Database".
OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana. OpenSearch allows users to specify a local file when defining text analyzers to process data for text analysis. An issue in the implementation of this feature allows certain specially crafted queries to return a response containing the first line of text from arbitrary files. The list of potentially impacted files is limited to text files with read permissions allowed in the Java Security Manager policy configuration. OpenSearch version 1.3.7 and 2.4.0 contain a fix for this issue. Users are advised to upgrade. There are no known workarounds for this issue.๐ Read
via "National Vulnerability Database".