πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Is MFA the Vegetable of Cybersecurity? πŸ•΄

Don’t fuss now β€” another helping of multifactor authentication can keep your organization strong and its data safer.

πŸ“– Read

via "Dark Reading".
⚠ Serious Security: MD5 considered harmful – to the tune of $600,000 ⚠

It's not just the hashing, by the way. It's the salting and the stretching, too!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-4257 β€Ό

A vulnerability was found in C-DATA Web Management System. It has been rated as critical. This issue affects some unknown processing of the file cgi-bin/jumpto.php of the component GET Parameter Handler. The manipulation of the argument hostname leads to argument injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214631.

πŸ“– Read

via "National Vulnerability Database".
⚠ The CHRISTMA EXEC network worm – 35 years and counting! ⚠

"Uh-oh, this viruses-and-worms scene could turn out quite troublesome." If only we'd been wrong...

πŸ“– Read

via "Naked Security".
⚠ S3 Ep111: The business risk of a sleazy β€œnudity unfilter” [Audio + Text] ⚠

Latest episode - listen now (or read if you prefer)...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-3696 β€Ό

A post-auth code injection vulnerability allows admins to execute code in Webadmin of Sophos Firewall older than version 19.5 GA.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29837 β€Ό

A path traversal vulnerability was addressed in Western Digital My Cloud Home, My Cloud Home Duo and SanDisk ibi which could allow an attacker to initiate installation of custom ZIP packages and overwrite system files. This could potentially lead to a code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3226 β€Ό

An OS command injection vulnerability allows admins to execute code via SSL VPN configuration uploads in Sophos Firewall older than version 19.5 GA.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41297 β€Ό

IBM Db2U 3.5, 4.0, and 4.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 237212.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3710 β€Ό

A post-auth read-only SQL injection vulnerability allows API clients to read non-sensitive configuration database contents in the API controller of Sophos Firewall older than version 19.5 GA.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2969 β€Ό

Delta Industrial Automation DIALink versions prior to v1.5.0.0 Beta 4 uses an external input to construct a pathname intended to identify a file or directory located underneath a restricted parent directory. However, the software does not properly neutralize special elements within the pathname, which can cause the pathname to resolve to a location outside of the restricted directory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3711 β€Ό

A post-auth read-only SQL injection vulnerability allows users to read non-sensitive configuration database contents in the User Portal of Sophos Firewall older than version 19.5 GA.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3713 β€Ό

A code injection vulnerability allows adjacent attackers to execute code in the Wifi controller of Sophos Firewall older than version 19.5 GA.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3709 β€Ό

A stored XSS vulnerability allows admin to super-admin privilege escalation in the Webadmin import group wizard of Sophos Firewall older than version 19.5 GA.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ ConnectWise Quietly Patches Flaw That Helps Phishers β™ŸοΈ

ConnectWise, a self-hosted, remote desktop software application that is widely used by Managed Service Providers (MSPs), is warning about an unusually sophisticated phishing attack that can let attackers take remote control over user systems when recipients click the included link. The warning comes just days after the company quietly patched a vulnerability that makes it easier for phishers to launch these attacks.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ One Year After Log4Shell, Most Firms Are Still Exposed to Attack πŸ•΄

Though there have been fewer than expected publicly reported attacks involving the vulnerability, nearly three-quarters of organizations remain exposed to it.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-43901 β€Ό

IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps 1.4.3 could disclose sensitive information. An authenticated local attacker could exploit this vulnerability to possibly gain information to other IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps components. IBM X-Force ID: 240829.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43900 β€Ό

IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps 1.4.2 could provide a weaker than expected security. A local attacker can create an outbound network connection to another system. IBM X-Force ID: 240827.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Artifact Poisoning in GitHub Actions Imports Malware via Software Pipelines πŸ•΄

A vulnerability discovered in GitHub Actions could allow an attacker to poison a developer's pipeline, highlighting the risk that insecure software pipelines pose.

πŸ“– Read

via "Dark Reading".
πŸ•΄ LastPass Discloses Second Breach in Three Months πŸ•΄

The threat actor behind an August intrusion used data from that incident to access customer data stored with a third-party cloud service provider, and affiliate GoTo reports breach of development environment.

πŸ“– Read

via "Dark Reading".
⚠ The CHRISTMA EXEC network worm – 35 years and counting! ⚠

"Uh-oh, this viruses-and-worms scene could turn out quite troublesome." If only we'd been wrong...

πŸ“– Read

via "Naked Security".