πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Malware Authors Inadvertently Takedown Own Botnet πŸ•΄

A single improperly formatted command has effectively killed KmsdBot botnet, security vendor says.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Privacy War Is Coming πŸ•΄

Privacy standards are only going to increase. It's time for organizations to get ahead of the coming reckoning.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-45046 β€Ό

The camel-ldap component allows LDAP Injection when using the filter option. Users are recommended to either move to the Camel-Spring-Ldap component (which is not affected) or upgrade to 3.14.6 or 3.18.4.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Infostealer Malware Market Booms, as MFA Fatigue Sets In πŸ•΄

The successful combo of stolen credentials and social engineering to breach networks is increasing demand for infostealers on the Dark Web.

πŸ“– Read

via "Dark Reading".
πŸ•΄ OpenSSF Membership Exceeds 100, With Many New Members Dedicated to Securing Open Source Software πŸ•΄

Introduces a "Developing Secure Software" training course in Japanese at OpenSSF Day Japan.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Palo Alto Networks Announces Medical IoT Security to Protect Connected Devices Critical to Patient Care πŸ•΄

The comprehensive zero trust security solution for medical devices lets healthcare organizations automate zero trust policy recommendations and manage new connected technologies quickly and securely.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The New External Attack Surface: 3 Elements Every Organization Should Monitor πŸ•΄

In short, the global Internet is now part of your external attack surface. Here’s how to better protect your users and data.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-32626 β€Ό

In display, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326239; Issue ID: ALPS07326239.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32634 β€Ό

In ccci, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07138646; Issue ID: ALPS07138646.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45315 β€Ό

Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp process. This vulnerability allows attackers to execute arbitrary code via a crafted packet.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45478 β€Ό

Telepad allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32596 β€Ό

In widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446213; Issue ID: ALPS07446213.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32624 β€Ό

In throttling, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07405923; Issue ID: ALPS07405923.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32629 β€Ό

In isp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310774; Issue ID: ALPS07310774.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4269 β€Ό

A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32625 β€Ό

In display, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326216; Issue ID: ALPS07326216.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32633 β€Ό

In Wi-Fi, there is a possible memory access violation due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441637; Issue ID: ALPS07441637.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32621 β€Ό

In isp, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310829; Issue ID: ALPS07310829.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32594 β€Ό

In widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446207; Issue ID: ALPS07446207.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32598 β€Ό

In widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446228; Issue ID: ALPS07446228.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32597 β€Ό

In widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446228; Issue ID: ALPS07446228.

πŸ“– Read

via "National Vulnerability Database".