πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Researchers Discover First Ever Major Ransomware Targeting macOS πŸ•΄

In targeting Apple users, LockBit is going where no major ransomware gang has gone before. But it's a warning shot, and Mac users need not worry yet.

πŸ“– Read

via "Dark Reading".
πŸ‘3
πŸ•΄ QBot Expands Initial Access Malware Strategy With PDF-WSF Combo πŸ•΄

The infamous Trojan's operators are switching up tactics with the use of simulated business correspondence, which helps instill trust with intended victims, and a stealthier payload.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-25556 β€Ό

A CWE-287: Improper Authentication vulnerability exists that could allow a device to be compromised when a key of less than seven digits is entered and the attacker has access to the KNX installation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22294 β€Ό

Privilege escalation in Tribe29 Checkmk Appliance before 1.6.4 allows authenticated site users to escalate privileges via incorrectly set permissions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29854 β€Ό

DirCMS 6.0.0 has a Cross Site Scripting (XSS) vulnerability in the foreground.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22307 β€Ό

Sensitive data exposure in Webconf in Tribe29 Checkmk Appliance before 1.6.4 allows local attacker to retrieve passwords via reading log files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29855 β€Ό

WBCE CMS 1.5.3 has a command execution vulnerability via admin/languages/install.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ NSO Group is Back in Business With 3 New iOS Zero-Click Exploits πŸ•΄

An investigation concludes that NSO Group was hired in 2022 to deploy Pegasus spyware against human rights workers in Mexico and other targets.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ Giving a Face to the Malware Proxy Service β€˜Faceless’ β™ŸοΈ

For the past seven years, a malware-based proxy service known as "Faceless" has sold anonymity to countless cybercriminals. For less than a dollar per day, Faceless customers can route their malicious traffic through tens of thousands of compromised systems advertised on the service. In this post we'll examine clues left behind over the past decade by the proprietor of Faceless, including some that may help put a face to the name.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Report: Over Half of North American Consumers Are Open to Passwordless πŸ•΄

1Password research reveals consumers are fed up with passwords; education, access, and validation will drive passwordless adoption.

πŸ“– Read

via "Dark Reading".
πŸ•΄ KnowBe4 Phishing Test Results Reveal IT and Online Services Emails Drive Dangerous Attack Trend πŸ•΄

KnowBe4 releases Q1 2023 global phishing report and finds that more IT and online services related email subjects are utilized as a phishing strategy.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Netwrix Annual Security Survey: 68% of Organizations Experienced a Cyberattack Within the Last 12 Months πŸ•΄

The most common consequences were unplanned expenses, loss of competitive edge, and decreased sales.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cyberattacks Can Cost Enterprises Up to 30% of Operating Income According to ThreatConnect πŸ•΄

Risk quantification research finds healthcare, manufacturing, and utilities suffer long-term financial impact from major cyberattacks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-21924 β€Ό

Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core). Supported versions that are affected are Prior to 6.3.1.3 and Prior to 7.0.0.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Health Sciences InForm. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Health Sciences InForm, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Health Sciences InForm accessible data as well as unauthorized read access to a subset of Oracle Health Sciences InForm accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Health Sciences InForm. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21997 β€Ό

Vulnerability in the Oracle User Management product of Oracle E-Business Suite (component: Proxy User Delegation). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle User Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle User Management accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯1
β€Ό CVE-2023-25548 β€Ό

A CWE-863: Incorrect Authorization vulnerability exists that could allow access to device credentials on specific DCE endpoints not being properly secured when a hacker is using a low privileged user. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21922 β€Ό

Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core). Supported versions that are affected are Prior to 6.3.1.3 and Prior to 7.0.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Health Sciences InForm. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Health Sciences InForm accessible data as well as unauthorized access to critical data or complete access to all Oracle Health Sciences InForm accessible data. CVSS 3.1 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28440 β€Ό

Discourse is an open source platform for community discussion. In affected versions a maliciously crafted request from a Discourse administrator can lead to a long-running request and eventual timeout. This has the greatest potential impact in shared hosting environments where admins are untrusted. This issue has been addressed in versions 3.0.3 and 3.1.0.beta4. Users are advised to upgrade. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25555 β€Ό

A CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that could allow a user that knows the credentials to execute unprivileged shell commands on the appliance over SSH. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21999 β€Ό

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".