πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Transcript: How can we stop insider theft? πŸ“’

Read the full transcript for this episode of the IT Pro Podcast

πŸ“– Read

via "ITPro".
πŸ•΄ Akamai Technologies to Acquire API Security Company Neosec πŸ•΄

Combined solutions expected to deliver complete API visibility and security coverage across all of the OWASP API top 10 attacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How to Prevent 2 Common Attacks on MFA πŸ•΄

MFA isn't immune from the tug of war between attackers and defenders.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-27777 β€Ό

Cross-site scripting (XSS) vulnerability was discovered in Online Jewelry Shop v1.0 that allows attackers to execute arbitrary script via a crafted URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30463 β€Ό

Altran picoTCP through 1.7.0 allows memory corruption (and subsequent denial of service) because of an integer overflow in pico_ipv6_alloc when processing large ICMPv6 packets. This affects installations with Ethernet support in which a packet size greater than 65495 may occur.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38125 β€Ό

Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Secomea SiteManager (FTP Agent modules) allows Exploiting Trust in Client.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26599 β€Ό

XSS vulnerability in TripleSign in Tripleplay Platform releases prior to Caveman 3.4.0 allows attackers to inject client-side code to run as an authenticated user via a crafted link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29921 β€Ό

PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create app interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0317 β€Ό

Unprotected Alternate Channel vulnerability in debug console of GateManager allows system administrator to obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27776 β€Ό

A stored cross-site scripting (XSS) vulnerability in /index.php?page=category_list of Online Jewelry Shop v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Category Name parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25759 β€Ό

OS Command Injection in TripleData Reporting Engine in Tripleplay Platform releases prior to Caveman 3.4.0 allows authenticated users to run unprivileged OS level commands via a crafted request payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22645 β€Ό

An Improper Privilege Management vulnerability in SUSE kubewarden allows attackers to read arbitrary secrets if they get access to the ServiceAccount kubewarden-controller This issue affects: SUSE kubewarden kubewarden-controller versions prior to 1.6.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4308 β€Ό

Plaintext Storage of a Password vulnerability in Secomea GateManager (USB wizard) allows Authentication abuse on SiteManager, if the generated file is leaked.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25760 β€Ό

Incorrect Access Control in Tripleplay Platform releases prior to Caveman 3.4.0 allows authenticated user to modify other users passwords via a crafted request payload

πŸ“– Read

via "National Vulnerability Database".
❀1
πŸ•΄ 3 Flaws, 1 War Dominated Cyber-Threat Landscape in 2022 πŸ•΄

Attackers continued to favor software exploits, phishing, and stolen credentials as initial-access methods last year, as Log4j and the Russia-Ukraine cyber conflict changed the threat landscape.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Popular Fitness Apps Leak Location Data Even When Users Set Privacy Zones πŸ•΄

Unsophisticated attackers can pinpoint where a person lives by lifting metadata from Strava and other apps, even if they're using a feature specifically aimed at protecting their location information.

πŸ“– Read

via "Dark Reading".
πŸ“’ β€œFull speed ahead” mentality in cloud native space causing security headaches πŸ“’

Red Hat says the rapid development of cloud native technologies means that security issues could go unnoticed

πŸ“– Read

via "ITPro".
β€Ό CVE-2023-29923 β€Ό

PowerJob V4.3.1 is vulnerable to Insecure Permissions. via the list job interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29586 β€Ό

Code Sector TeraCopy 3.9.7 does not perform proper access validation on the source folder during a copy operation. This leads to Arbitrary File Read by allowing any user to copy any directory in the system to a directory they control.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30612 β€Ό

Cloud hypervisor is a Virtual Machine Monitor for Cloud workloads. This vulnerability allows users to close arbitrary open file descriptors in the Cloud Hypervisor process via sending malicious HTTP request through the HTTP API socket. As a result, the Cloud Hypervisor process can be easily crashed, causing Deny-of-Service (DoS). This can also be a potential Use-After-Free (UAF) vulnerability. Users require to have the write access to the API socket file to trigger this vulnerability. Impacted versions of Cloud Hypervisor include upstream main branch, v31.0, and v30.0. The vulnerability was initially detected by our `http_api_fuzzer` via oss-fuzz. This issue has been addressed in versions 30.1 and 31.1. Users unable to upgrade may mitigate this issue by ensuring the write access to the API socket file is granted to trusted users only.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1900 β€Ό

A vulnerability within the Avira network protection feature allowed an attacker with local execution rights to cause an overflow. This could corrupt the data on the heap and lead to a denial-of-service situation. Issue was fixed with Endpointprotection.exe version 1.0.2303.633

πŸ“– Read

via "National Vulnerability Database".