πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Jailbreak Trick Breaks ChatGPT Content Safeguards πŸ•΄

Jailbreak command creates ChatGPT alter ego DAN, willing to create content outside of its own content restriction controls.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CISA Releases Recovery Script for Victims of ESXiArgs Ransomware πŸ•΄

The malware has affected thousands of VMware ESXi hypervisors in the last few days.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-38777 β€Ό

An issue was discovered in the rollback feature of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47648 β€Ό

Bosch Security Systems B420 firmware 02.02.0001 employs IP based authorization in its authentication mechanism, allowing attackers to access the device as long as they are on the same network as a legitimate user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25163 β€Ό

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. If the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message. But if they have that level of access, they are probably intended to have access to the credentials anyway. A patch for this vulnerability has been released in version 2.6.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38778 β€Ό

A flaw (CVE-2022-38900) was discovered in one of KibanaÒ€ℒs third party dependencies, that could allow an authenticated user to perform a request that crashes the Kibana server process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45982 β€Ό

thinkphp 6.0.0~6.0.13 and 6.1.0~6.1.1 contains a deserialization vulnerability. This vulnerability allows attackers to execute arbitrary code via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Lessons From the Cold War: How Quality Trumps Quantity in Cybersecurity πŸ•΄

High-quality tools and standards remain critical components in cybersecurity efforts even as budgets decline. It's important that staff knows response procedures and their roles, and also communicates well.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-0760 β€Ό

Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0759 β€Ό

Privilege Chaining in GitHub repository cockpit-hq/cockpit prior to 2.3.8.

πŸ“– Read

via "National Vulnerability Database".
⚠ OpenSSL fixes High Severity data-stealing bug – patch now! ⚠

7 memory mismanagements and a timing attack. We explain all the jargon bug terminology in plain English...

πŸ“– Read

via "Naked Security".
😱1
β€Ό CVE-2023-22953 β€Ό

In ExpressionEngine before 7.2.6, remote code execution can be achieved by an authenticated Control Panel user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0624 β€Ό

OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0574 β€Ό

Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0 through 2.13.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Twitter Implements API Paywall; But Will That Solve Its Enormous Bot Crisis? πŸ•΄

Restricting the Twitter API will have implications across Twitter, the broader Internet, and society, experts say. Is there a cybersecurity silver lining, or will threat actors pay to play?

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ New XSS Hunter host Truffle Security faces privacy backlash πŸ—“οΈ

Anonymized numbers of bug discoveries swiftly deleted after pushback

πŸ“– Read

via "The Daily Swig".
⚠ S3 Ep121: Can you get hacked and then prosecuted for it? [Audio + Text] ⚠

Latest epsiode. Listen now!

πŸ“– Read

via "Naked Security".
πŸ•΄ In Perfect Harmony: Cybersecurity Regulation Harmonization πŸ•΄

By simplifying compliance management, security and risk teams can focus on managing operational risk, not compliance risk β€” and better counter threats.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ NIST Picks IoT Standard for Small Electronics Cybersecurity πŸ•΄

NIST announces that it will use Ascon as a cryptography standard for lightweight IoT device protection.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-48293 β€Ό

The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.

πŸ“– Read

via "National Vulnerability Database".