βΌ CVE-2023-1017 βΌ
π Read
via "National Vulnerability Database".
An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.π Read
via "National Vulnerability Database".
βΌ CVE-2019-14648 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1065 βΌ
π Read
via "National Vulnerability Database".
This vulnerability in the Snyk Kubernetes Monitor can result in irrelevant data being posted to a Snyk Organization, which could in turn obfuscate other, relevant, security issues. It does not expose the user of the integration to any direct security risk and no user data can be leaked. To exploit the vulnerability the attacker does not need to be authenticated to Snyk but does need to know the target's Integration ID (which may or may not be the same as the Organization ID, although this is an unpredictable UUID in either case).π Read
via "National Vulnerability Database".
π΄ Exfiltrator-22: The Newest Post-Exploitation Toolkit Nipping at Cobalt Strike's Heels π΄
π Read
via "Dark Reading".
The framework-as-a-service signals an intensification of the cat-and-mouse game between defenders detecting lateral movement, and cybercriminals looking to go unnoticed.π Read
via "Dark Reading".
Dark Reading
Exfiltrator-22: The Newest Post-Exploitation Toolkit Nipping at Cobalt Strike's Heels
The framework-as-a-service signals an intensification of the cat-and-mouse game between defenders detecting lateral movement, and cybercriminals looking to go unnoticed.
π΄ LastPass DevOps Engineer Targeted for Cloud Decryption Keys in Latest Breach Revelation π΄
π Read
via "Dark Reading".
The adversaries obtained a decryption key to a LastPass database containing multifactor authentication and federation information as well as customer vault data, company says.π Read
via "Dark Reading".
Dark Reading
LastPass DevOps Engineer Targeted for Cloud Decryption Keys in Latest Breach Revelation
The adversaries obtained a decryption key to a LastPass database containing multifactor authentication and federation information as well as customer vault data, company says.
π΄ Hoxhunt Launches Human Risk Management Platform π΄
π Read
via "Dark Reading".
Platform uniquely designed to facilitate automated compliance, security behavior change.π Read
via "Dark Reading".
Dark Reading
Hoxhunt Launches Human Risk Management Platform
Platform uniquely designed to facilitate automated compliance, security behavior change.
π΄ Two of The Worst Healthcare Data Breaches in US History Happened Last Year π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
2 of the Worst Healthcare Data Breaches in US History Happened Last Year
MIAMI, Feb. 28, 2023 /PRNewswire/ -- Network Assured shared the results of a recent study on cyberattacks against U.S. healthcare organizations. It looked at the total number of data breaches historically, the number of individuals affected, and the financialβ¦
βΌ CVE-2023-1099 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in SourceCodester Online Student Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file eduauth/edit-class-detail.php?editid=1. The manipulation of the argument editideditid leads to sql injection. The attack may be launched remotely. VDB-222002 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-22996 βΌ
π Read
via "National Vulnerability Database".
In the Linux kernel before 5.17.2, drivers/soc/qcom/qcom_aoss.c does not release an of_find_device_by_node reference after use, e.g., with put_device.π Read
via "National Vulnerability Database".
βΌ CVE-2023-22997 βΌ
π Read
via "National Vulnerability Database".
In the Linux kernel before 6.1.2, kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).π Read
via "National Vulnerability Database".
βΌ CVE-2023-22998 βΌ
π Read
via "National Vulnerability Database".
In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).π Read
via "National Vulnerability Database".
βΌ CVE-2023-22999 βΌ
π Read
via "National Vulnerability Database".
In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).π Read
via "National Vulnerability Database".
βΌ CVE-2023-1100 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as critical has been found in SourceCodester Online Catering Reservation System 1.0. This affects an unknown part of the file /reservation/add_message.php of the component POST Parameter Handler. The manipulation of the argument fullname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222003.π Read
via "National Vulnerability Database".
π’ Paying ransomware gangs could fund up to ten additional attacks π’
π Read
via "ITPro".
The research from Trend Micro highlights the potential domino effect of paying ransomsπ Read
via "ITPro".
ITPro
Paying ransomware gangs could fund up to ten additional attacks
The research from Trend Micro highlights the potential domino effect of paying ransoms
π’ How to build a cyber-resilient business read to innovate and thrive π’
π Read
via "ITPro".
Outperform your peers in your successful business outcomesπ Read
via "ITPro".
ITPro
How to build a cyber-resilient business ready to innovate and thrive
Outperform your peers in your successful business outcomes
π’ MWC 2023: Huawei launches 'world's best' ransomware detection system π’
π Read
via "ITPro".
Huawei claims its Cyber Engine database security system has a 99.9% detection rate, but experts have been quick to weaken the sentimentπ Read
via "ITPro".
Cloud Pro
MWC 2023: Huawei launches 'world's best' ransomware detection system
Huawei claims its Cyber Engine database security system has a 99.9% detection rate, but experts have been quick to weaken the sentiment
π’ State-sponsored hackers are diversifying tactics, targeting small businesses π’
π Read
via "ITPro".
Research has warned that state-sponsored threat actors will increasingly target smaller enterprises in 2023π Read
via "ITPro".
ITPro
State-sponsored hackers are diversifying tactics, targeting small businesses
Research has warned that state-sponsored threat actors will increasingly target smaller enterprises in 2023
π’ What you need to know about Gmail's new client-side encryption feature π’
π Read
via "ITPro".
The new encryption feature will bolster security and give businesses greater control over access to dataπ Read
via "ITPro".
ITPro
What you need to know about Gmail's new client-side encryption feature
The new encryption feature will bolster security and give businesses greater control over access to data
π1
π’ Australia commits to establishing second national cyber security agency π’
π Read
via "ITPro".
The country is still aiming to be the most cyber-secure country in the world by 2030π Read
via "ITPro".
ITPro
Australia commits to establishing second national cyber security agency
The country is still aiming to be the most cyber-secure country in the world by 2030
π’ How to turn on Windows Defender π’
π Read
via "ITPro".
Find out how to switch on Windows Defender in Windows 10 and Windows 11, and turn it off again if necessaryπ Read
via "ITPro".
ITPro
How to turn on Windows Defender
A simple guide on how to turn on Windows Defender in Windows 10 and Windows 11, and turn it off again if necessary
π’ News Corp admits China-linked hackers breached company for two years π’
π Read
via "ITPro".
The News Corp breach follows recent news that threat actors had access to GoDaddy systems for three yearsπ Read
via "ITPro".
ITPro
News Corp admits China-linked hackers breached company for two years
The News Corp breach follows recent news that threat actors had access to GoDaddy systems for three years
π1