πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-44262 β€Ό

ff4j 1.8.1 is vulnerable to Remote Code Execution (RCE).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1471 β€Ό

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3270 β€Ό

In multiple products by Festo a remote unauthenticated attacker could use functions of an undocumented protocol which could lead to a complete loss of confidentiality, integrity and availability.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Guidehouse Insights Anticipates Market for Automotive Cybersecurity Solutions Will Grow to More Than $445 Billion by 2031 πŸ•΄

Market drivers include new regulations, increasing automobile complexity, and new vehicle types.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CyberRatings.org Announces Results from First-of-its-Kind Comparative Test on Cloud Network Firewall πŸ•΄

Ratings ranged from AAA to CC, with security effectiveness scores from 27% to 100%.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ Data Security Concerns Are Driving Changes in US Consumer Behavior and Demands πŸ•΄

As consumers catch on to the dangers, protection could become a major topic for legislative bodies.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Phylum Expands Its Software Supply Chain Security Capabilities, Introduces Automated Vulnerability Reachability πŸ•΄

Know what you need to fix today and what you don’t.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Critical vulnerability allowed attackers to remotely unlock, control Hyundai, Genesis vehicles πŸ—“οΈ

Vehicles made after 2012 were vulnerable to web app exploit

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2022-28607 β€Ό

An issue was discovered in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to gain sensitive information via the action parameter to /system/user/modules/mod_users/controller.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37016 β€Ό

Symantec Endpoint Protection (Windows) agent may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30528 β€Ό

SQL Injection vulnerability in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to execute arbitrary commands via the username parameter to /system/user/modules/mod_users/controller.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37017 β€Ό

Symantec Endpoint Protection (Windows) agent, prior to 14.3 RU6/14.3 RU5 Patch 1, may be susceptible to a Security Control Bypass vulnerability, which is a type of issue that can potentially allow a threat actor to circumvent existing security controls. This CVE applies narrowly to the Client User Interface Password protection and Policy Import/Export Password protection, if it has been enabled.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ IBM Cloud Supply Chain Vulnerability Showcases New Threat Class πŸ•΄

The Hell's Keychain attack vector highlights common cloud misconfigurations and secrets exposure that can pose grave risk to enterprise customers.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Is MFA the Vegetable of Cybersecurity? πŸ•΄

Don’t fuss now β€” another helping of multifactor authentication can keep your organization strong and its data safer.

πŸ“– Read

via "Dark Reading".
⚠ Serious Security: MD5 considered harmful – to the tune of $600,000 ⚠

It's not just the hashing, by the way. It's the salting and the stretching, too!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-4257 β€Ό

A vulnerability was found in C-DATA Web Management System. It has been rated as critical. This issue affects some unknown processing of the file cgi-bin/jumpto.php of the component GET Parameter Handler. The manipulation of the argument hostname leads to argument injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214631.

πŸ“– Read

via "National Vulnerability Database".
⚠ The CHRISTMA EXEC network worm – 35 years and counting! ⚠

"Uh-oh, this viruses-and-worms scene could turn out quite troublesome." If only we'd been wrong...

πŸ“– Read

via "Naked Security".
⚠ S3 Ep111: The business risk of a sleazy β€œnudity unfilter” [Audio + Text] ⚠

Latest episode - listen now (or read if you prefer)...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-3696 β€Ό

A post-auth code injection vulnerability allows admins to execute code in Webadmin of Sophos Firewall older than version 19.5 GA.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29837 β€Ό

A path traversal vulnerability was addressed in Western Digital My Cloud Home, My Cloud Home Duo and SanDisk ibi which could allow an attacker to initiate installation of custom ZIP packages and overwrite system files. This could potentially lead to a code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3226 β€Ό

An OS command injection vulnerability allows admins to execute code via SSL VPN configuration uploads in Sophos Firewall older than version 19.5 GA.

πŸ“– Read

via "National Vulnerability Database".