π΄ CNAPP Shines a Light Into Evolving Cloud Environments π΄
π Read
via "Dark Reading".
Cloud-native application protection platform (CNAPP) addresses security challenges in multicloud environments, including integrating applications across multicloud or hybrid cloud environments.π Read
via "Dark Reading".
Dark Reading
CNAPP Shines a Light Into Evolving Cloud Environments
Cloud-native application protection platform (CNAPP) addresses security challenges in multicloud environments, including integrating applications across multicloud or hybrid cloud environments.
π΄ 3 Ways Attackers Bypass Cloud Security π΄
π Read
via "Dark Reading".
At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud.π Read
via "Dark Reading".
Dark Reading
3 Ways Attackers Bypass Cloud Security
At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud.
βΌ CVE-2022-38765 βΌ
π Read
via "National Vulnerability Database".
Canon Medical Informatics Vitrea Vision 7.7.76.1 does not adequately enforce access controls. An authenticated user is able to gain unauthorized access to imaging records by tampering with the vitrea-view/studies/search patientId parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41947 βΌ
π Read
via "National Vulnerability Database".
DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. Through various features of DHIS2, an authenticated user may be able to upload a file which includes embedded javascript. The user could then potentially trick another authenticated user to open the malicious file in a browser which would trigger the javascript code, resulting in a cross-site scripting (XSS) attack. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. Users unable to upgrade may add the following simple CSP rule in your web proxy to the vulnerable endpoints: `script-src 'none'`. This workaround will prevent all javascript from running on those endpoints.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41948 βΌ
π Read
via "National Vulnerability Database".
DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. Affected versions are subject to a privilege escalation vulnerability. A DHIS2 user with authority to manage users can assign superuser privileges to themself by manually crafting an HTTP PUT request. Only users with the following DHIS2 user role authorities can exploit this vulnerability. Note that in many systems the only users with user admin privileges are also superusers. In these cases, the escalation vulnerability does not exist. The vulnerability is only exploitable by attackers who can authenticate as users with the user admin authority. As this is usually a small and relatively trusted set of users, exploit vectors will often be limited. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. The only known workaround to this issue is to avoid the assignment of the user management authority to any users until the patch has been applied.π Read
via "National Vulnerability Database".
ποΈ JSON syntax hack allowed SQL injection payloads to be smuggled past WAFs ποΈ
π Read
via "The Daily Swig".
Five vendors act to thwart generic hackπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
JSON syntax hack allowed SQL injection payloads to be smuggled past WAFs
Five vendors act to thwart generic hack
π1
βΌ CVE-2022-2752 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the web server of Secomea GateManager allows a local user to impersonate as the previous user under some failed login conditions. This issue affects: Secomea GateManager versions from 9.4 through 9.7.π Read
via "National Vulnerability Database".
π΄ Google: Use SLSA Framework for Better Software Security π΄
π Read
via "Dark Reading".
Security leaders also need to take a more holistic approach to addressing supply chain risks, company says in new research report.π Read
via "Dark Reading".
Dark Reading
Google: Use SLSA Framework for Better Software Security
Security leaders also need to take a more holistic approach to addressing supply chain risks, company says in new research report.
π΄ How Naming Can Change the Game in Software Supply Chain Security π΄
π Read
via "Dark Reading".
A reliance on CPE names currently makes accurate searching for high-risk security vulnerabilities difficult.π Read
via "Dark Reading".
Dark Reading
How Naming Can Change the Game in Software Supply Chain Security
A reliance on CPE names currently makes accurate searching for high-risk security vulnerabilities difficult.
β Credit card skimming β the long and winding road of supply chain failure β
π Read
via "Naked Security".
Don't keep calling home to a JavaScript server that closed its doors eight years ago!π Read
via "Naked Security".
Naked Security
Credit card skimming β the long and winding road of supply chain failure
Donβt keep calling home to a JavaScript server that closed its doors eight years ago!
π΄ Iranian APT Targets US With Drokbk Spyware via GitHub π΄
π Read
via "Dark Reading".
The custom malware used by the state-backed Iranian threat group Drokbk has so far flown under the radar by using GitHub as a "dead-drop resolver" to more easily evade detection.π Read
via "Dark Reading".
Dark Reading
Iranian APT Targets US With Drokbk Spyware via GitHub
The custom malware used by the state-backed Iranian threat group Drokbk has so far flown under the radar by using GitHub as a "dead-drop resolver" to more easily evade detection.
π΄ 43 Trillion Security Data Points Illuminate Our Most Pressing Threats π΄
π Read
via "Dark Reading".
A new report helps companies understand an ever-changing threat landscape and how to strengthen their defenses against emerging cybersecurity trends.π Read
via "Dark Reading".
Dark Reading
43 Trillion Security Data Points Illuminate Our Most Pressing Threats
A new report helps companies understand an ever-changing threat landscape and how to strengthen their defenses against emerging cybersecurity trends.
βΌ CVE-2022-44213 βΌ
π Read
via "National Vulnerability Database".
ZKTeco Xiamen Information Technology ZKBio ECO ADMS <=3.1-164 is vulnerable to Cross Site Scripting (XSS).π Read
via "National Vulnerability Database".
βΌ CVE-2022-4264 βΌ
π Read
via "National Vulnerability Database".
Incorrect Privilege Assignment in M-Files Web (Classic) in M-Files before 22.8.11691.0 allows low privilege user to change some configuration.π Read
via "National Vulnerability Database".
β S3 Ep112: Data breaches can haunt you more than once! [Audio + Text] β
π Read
via "Naked Security".
Breaches, exploits, busts, buffer overflows and bug hunting - entertaining and educational in equal measure.π Read
via "Naked Security".
Naked Security
S3 Ep112: Data breaches can haunt you more than once! [Audio + Text]
Breaches, exploits, busts, buffer overflows and bug hunting β entertaining and educational in equal measure.
π1π₯1
ποΈ ChatGPT bid for bogus crypto bug bounty is thwarted ποΈ
π Read
via "The Daily Swig".
Improving large language models offer βjust one more way to attack code, and one more way to defend codeβπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
ChatGPT bid for bogus bug bounty is thwarted
Improving large language models offer βjust one more way to attack code, and one more way to defend codeβ
π΄ 7 Ways Gaming Companies Can Battle Cybercrime on Their Platforms π΄
π Read
via "Dark Reading".
Balancing gameplay and security can drive down risks and improve gamers' trust and loyalty.π Read
via "Dark Reading".
βΌ CVE-2022-23479 βΌ
π Read
via "National Vulnerability Database".
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a buffer over flow in xrdp_mm_chan_data_in() function. There are no known workarounds for this issue. Users are advised to upgrade.π Read
via "National Vulnerability Database".
βΌ CVE-2022-4170 βΌ
π Read
via "National Vulnerability Database".
The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23468 βΌ
π Read
via "National Vulnerability Database".
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a buffer over flow in xrdp_login_wnd_create() function. There are no known workarounds for this issue. Users are advised to upgrade.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29838 βΌ
π Read
via "National Vulnerability Database".
Improper Authentication vulnerability in the encrypted volumes and auto mount features of Western Digital My Cloud devices allows insecure direct access to the drive information in the case of a device reset. This issue affects: Western Digital My Cloud My Cloud versions prior to 5.25.124 on Linux.π Read
via "National Vulnerability Database".