πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-1548 β€Ό

A CWE-269: Improper Privilege Management vulnerability exists that could cause a local user to perform a denial of service through the console server service that is part of EcoStruxure Control Expert. Affected Products:Γ‚ EcoStruxure Control Expert (V15.1 and above)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27976 β€Ό

A CWE-668: Exposure of Resource to Wrong Sphere vulnerability exists that could cause remote code execution when a valid user visits a malicious link provided through the web endpoints. Affected Products:Γ‚ EcoStruxure Control Expert (V15.1 and above)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28141 β€Ό

An NTFS Junction condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.5.3.1. Attackers may write files to arbitrary locations via a local attack vector. This allows attackers to assume the privileges of the process, and they may delete or otherwise on unauthorized files, allowing for the potential modification or deletion of sensitive files limited only to that specific directory/file object. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28142 β€Ό

A Race Condition exists in the Qualys Cloud Agent for Windows platform in versions from 3.1.3.34 and before 4.5.3.1. This allows attackers to escalate privileges limited on the local machine during uninstallation of the Qualys Cloud Agent for Windows. Attackers may gain SYSTEM level privileges on that asset to run arbitrary commands. At the time of this disclosure, versions before 4.0 are classified as End of Life.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28140 β€Ό

An Executable Hijacking condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.5.3.1. Attackers may load a malicious copy of a Dependency Link Library (DLL) via a local attack vector instead of the DLL that the application was expecting, when processes are running with escalated privileges. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28143 β€Ό

Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7) installer allows a local escalation of privilege bounded only to the time of installation and only on older macOSX (macOS 10.15 and older) versions. Attackers may exploit incorrect file permissions to give them ROOT command execution privileges on the host. During the install of the PKG, a step in the process involves extracting the package and copying files to several directories. Attackers may gain writable access to files during the install of PKG when extraction of the package and copying files to several directories, enabling a local escalation of privilege.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Where There's No Code, There's No SDLC πŸ•΄

How can we build security back into software development in a low-code/no-code environment?

πŸ“– Read

via "Dark Reading".
πŸ•΄ Researchers Discover First Ever Major Ransomware Targeting macOS πŸ•΄

In targeting Apple users, LockBit is going where no major ransomware gang has gone before. But it's a warning shot, and Mac users need not worry yet.

πŸ“– Read

via "Dark Reading".
πŸ‘3
πŸ•΄ QBot Expands Initial Access Malware Strategy With PDF-WSF Combo πŸ•΄

The infamous Trojan's operators are switching up tactics with the use of simulated business correspondence, which helps instill trust with intended victims, and a stealthier payload.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-25556 β€Ό

A CWE-287: Improper Authentication vulnerability exists that could allow a device to be compromised when a key of less than seven digits is entered and the attacker has access to the KNX installation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22294 β€Ό

Privilege escalation in Tribe29 Checkmk Appliance before 1.6.4 allows authenticated site users to escalate privileges via incorrectly set permissions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29854 β€Ό

DirCMS 6.0.0 has a Cross Site Scripting (XSS) vulnerability in the foreground.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22307 β€Ό

Sensitive data exposure in Webconf in Tribe29 Checkmk Appliance before 1.6.4 allows local attacker to retrieve passwords via reading log files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29855 β€Ό

WBCE CMS 1.5.3 has a command execution vulnerability via admin/languages/install.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ NSO Group is Back in Business With 3 New iOS Zero-Click Exploits πŸ•΄

An investigation concludes that NSO Group was hired in 2022 to deploy Pegasus spyware against human rights workers in Mexico and other targets.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ Giving a Face to the Malware Proxy Service β€˜Faceless’ β™ŸοΈ

For the past seven years, a malware-based proxy service known as "Faceless" has sold anonymity to countless cybercriminals. For less than a dollar per day, Faceless customers can route their malicious traffic through tens of thousands of compromised systems advertised on the service. In this post we'll examine clues left behind over the past decade by the proprietor of Faceless, including some that may help put a face to the name.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Report: Over Half of North American Consumers Are Open to Passwordless πŸ•΄

1Password research reveals consumers are fed up with passwords; education, access, and validation will drive passwordless adoption.

πŸ“– Read

via "Dark Reading".
πŸ•΄ KnowBe4 Phishing Test Results Reveal IT and Online Services Emails Drive Dangerous Attack Trend πŸ•΄

KnowBe4 releases Q1 2023 global phishing report and finds that more IT and online services related email subjects are utilized as a phishing strategy.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Netwrix Annual Security Survey: 68% of Organizations Experienced a Cyberattack Within the Last 12 Months πŸ•΄

The most common consequences were unplanned expenses, loss of competitive edge, and decreased sales.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cyberattacks Can Cost Enterprises Up to 30% of Operating Income According to ThreatConnect πŸ•΄

Risk quantification research finds healthcare, manufacturing, and utilities suffer long-term financial impact from major cyberattacks.

πŸ“– Read

via "Dark Reading".