πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ RSA crypto cracked? Or perhaps not! ⚠

Stand down from blue alert, it seems... but why not plan your cryptographic agility anyway?

πŸ“– Read

via "Naked Security".
πŸ‘1
β™ŸοΈ Identity Thieves Bypassed Experian Security to View Credit Reports β™ŸοΈ

Identity thieves have been exploiting a glaring security weakness in the website of Experian, one of the big three consumer credit reporting bureaus. Normally, Experian requires that those seeking a copy of their credit report successfully answer several multiple choice questions about their financial history. But until the end of 2022, Experian's website allowed anyone to bypass these questions and go straight to the consumer's report. All that was needed was the person's name, address, birthday and Social Security number.

πŸ“– Read

via "Krebs on Security".
πŸ›  cryptmount Filesystem Manager 6.2.0 πŸ› 

cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.

πŸ“– Read

via "Packet Storm Security".
πŸ›  GNUnet P2P Framework 0.19.2 πŸ› 

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

πŸ“– Read

via "Packet Storm Security".
πŸ‘1
πŸ›  tcpdump 4.99.2 πŸ› 

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

πŸ“– Read

via "Packet Storm Security".
πŸ‘2
πŸ•΄ Web 3.0 Shifts Attack Surface and Highlights Need for Continuous Security πŸ•΄

A model of continuous authentication and identification is needed to keep consumers safe.

πŸ“– Read

via "Dark Reading".
⚠ CircleCI – code-building service suffers total credential compromise ⚠

They're saying "rotate secrets"... in plain English, they mean "change your credentials". The company has a tool to help you find them all.

πŸ“– Read

via "Naked Security".
πŸ‘1
β€Ό CVE-2023-22472 β€Ό

Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. It is possible to make a user send any POST request with an arbitrary body given they click on a malicious deep link on a Windows computer. (e.g. in an email, chat link, etc). There are currently no known workarounds. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23509 β€Ό

Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. GitOps run has a local S3 bucket which it uses for synchronizing files that are later applied against a Kubernetes cluster. The communication between GitOps Run and the local S3 bucket is not encrypted. This allows privileged users or process to tap the local traffic to gain information permitting access to the s3 bucket. From that point, it would be possible to alter the bucket content, resulting in changes in the Kubernetes cluster's resources. There are no known workaround(s) for this vulnerability. This vulnerability has been fixed by commits ce2bbff and babd915. Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23508 β€Ό

Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. A vulnerability in GitOps run could allow a local user or process to alter a Kubernetes cluster's resources. GitOps run has a local S3 bucket which it uses for synchronizing files that are later applied against a Kubernetes cluster. Its endpoint had no security controls to block unauthorized access, therefore allowing local users (and processes) on the same machine to see and alter the bucket content. By leveraging this vulnerability, an attacker could pick a workload of their choosing and inject it into the S3 bucket, which resulted in the successful deployment in the target cluster, without the need to provide any credentials to either the S3 bucket nor the target Kubernetes cluster. There are no known workarounds for this issue, please upgrade. This vulnerability has been fixed by commits 75268c4 and 966823b. Users should upgrade to Weave GitOps version >= v0.12.0 released on 08/12/2022. ### Workarounds There is no workaround for this vulnerability. ### References Disclosed by Paulo Gomes, Senior Software Engineer, Weaveworks. ### For more information If you have any questions or comments about this advisory: - Open an issue in [Weave GitOps repository](https://github.com/weaveworks/weave-gitops) - Email us at [support@weave.works](mailto:support@weave.works)

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 7 Use Cases for Distributed Cloud Environments πŸ•΄

As infrastructure has grown more complex, the need to effectively manage it has grown, too – particularly for applications and APIs.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CISOs Are Focused on These 3 Trends. Are You? πŸ•΄

The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-22473 β€Ό

Talk-Android enables users to have video & audio calls through Nextcloud on Android. Due to passcode bypass, an attacker is able to access the user's Nextcloud files and view conversations. To exploit this the attacker needs to have physical access to the target's device. There are currently no known workarounds available. It is recommended that the Nextcloud Talk Android app is upgraded to 15.0.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-22477 β€Ό

Mercurius is a GraphQL adapter for Fastify. Any users of Mercurius until version 10.5.0 are subjected to a denial of service attack by sending a malformed packet over WebSocket to `/graphql`. This issue was patched in #940. As a workaround, users can disable subscriptions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ JsonWebToken Security Bug Opens Servers to RCE πŸ•΄

The JsonWebToken package plays a big role in the authentication and authorization functionality for many applications.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 'Copyright Infringement' Lure Used for Facebook Credential Harvesting πŸ•΄

Business users receive a message from Facebook warning their accounts will be permanently suspended for using photos illegally if they don't appeal within 24 hours, leading victims to a credential-harvesting page instead.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-46258 β€Ό

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should enforce workflow scope. This vulnerability affected all versions of GitHub Enterprise Server prior to version 3.7 and was fixed in versions 3.3.16, 3.4.11, 3.5.8, and 3.6.4. This vulnerability was reported via the GitHub Bug Bounty program.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47790 β€Ό

Sourcecodester Dynamic Transaction Queuing System v1.0 is vulnerable to SQL Injection via /queuing/index.php?page=display&id=.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4884 β€Ό

Path-Traversal in MKP storing in Tribe29 Checkmk <=2.0.0p32 and <= 2.1.0p18 allows an administrator to write mkp files to arbitrary locations via a malicious mkp file.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ•΄ Rackspace Ransomware Incident Highlights Risks of Relying on Mitigation Alone πŸ•΄

Organizations often defer patching because of business disruption fears β€” but that didn't work out very well for Rackspace's Hosted Exchange service.

πŸ“– Read

via "Dark Reading".
πŸ‘1