πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-33544 β€Ό

hawtio 2.17.2 is vulnerable to Path Traversal. it is possible to input malicious zip files, which can result in the high-risk files after decompression being stored in any location, even leading to file overwrite.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43760 β€Ό

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SUSE Rancher allows users in some higher-privileged groups to to inject code that is executed within another user's browser, allowing the attacker to steal sensitive information, manipulate web content, or perform other malicious activities on behalf of the victims. This could result in a user with write access to the affected areas being able to act on behalf of an administrator, once an administrator opens the affected web page.This issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  AIEngine 2.4.0 πŸ› 

AIEngine is a next generation interactive/programmable Python/Ruby/Java/Lua and Go network intrusion detection system engine. AIEngine also helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

πŸ“– Read

via "Packet Storm Security".
⚠ Serious Security: That KeePass β€œmaster password crack”, and what we can learn from it ⚠

Here, in an admittedly discursive nutshell, is the fascinating story of CVE-2023-32784. (Short version: Don't panic.)

πŸ“– Read

via "Naked Security".
❀1
πŸ•΄ Biometric Bypass: BrutePrint Makes Short Work of Fingerprint Security πŸ•΄

Bugs in the biometric protections on Android phones and iPhones allow the limit on the number of tries to unlock the devices with a fingerprint can be bypassed, allowing automated brute-force attacks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-33965 β€Ό

Brook is a cross-platform programmable network tool. The `tproxy` server is vulnerable to a drive-by command injection. An attacker may fool a victim into visiting a malicious web page which will trigger requests to the local `tproxy` service leading to remote code execution. A patch is available in version 20230606.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ Ask Fitis, the Bear: Real Crooks Sign Their Malware β™ŸοΈ

Code-signing certificates are supposed to help authenticate the identity of software publishers, and provide cryptographic assurance that a signed piece of software has not been altered or tampered with. Both of these qualities make stolen or ill-gotten code-signing certificates attractive to cybercriminal groups, who prize their ability to add stealth and longevity to malicious software. This post is a deep dive on "Megatraffer," a veteran Russian hacker who has practically cornered the underground market for malware focused code-signing certificates since 2015.

πŸ“– Read

via "Krebs on Security".
πŸ“’ Warning issued over β€˜widespread’ exploitation of Zyxel NAS devices πŸ“’

Zyxel has been forced to issue patches for several vulnerabilities affecting NAS devices

πŸ“– Read

via "ITPro".
⚠ S3 Ep137: 16th century crypto skullduggery ⚠

Lots to learn, clearly explained in plain English... listen now! (Full transcript inside.)

πŸ“– Read

via "Naked Security".
⚠ Serious Security: That KeePass β€œmaster password crack”, and what we can learn from it ⚠

Here, in an admittedly discursive nutshell, is the fascinating story of CVE-2023-32784. (Short version: Don't panic.)

πŸ“– Read

via "Naked Security".
πŸ•΄ Where SBOMs Stand Today πŸ•΄

It's been two years since Executive Order 14028. By using SBOMs as a standard, organizations can manage software risks, protect their reputation, and improve their cybersecurity posture.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Novel PyPI Malware Uses Compiled Python Bytecode to Evade Detection πŸ•΄

In an already fraught environment surrounding the popular Python programming language software package manager, hackers are coming up with new ways to sneak malicious goodies past cybersecurity buffers.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace πŸ•΄

No activity logging in the free subscription for Google's Web-based productivity suite exposes enterprises to insider and other threats, researchers say.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Sustained 'Red Deer' Phishing Attacks Impersonate Israel Post, Drop RATs πŸ•΄

The "missed package" phishing messages, likely the work of a hacking-for-hire group, bounds into inboxes, bearing ASyncRAT.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-32310 β€Ό

DataEase is an open source data visualization and analysis tool. The API interface for DataEase delete dashboard and delete system messages is vulnerable to insecure direct object references (IDOR). This could result in a user deleting another user's dashboard or messages or interfering with the interface for marking messages read. The vulnerability has been fixed in v1.18.7. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32713 β€Ό

In Splunk App for Stream versions below 8.1.1, a low-privileged user could use a vulnerability in the streamfwd process within the Splunk App for Stream to escalate their privileges on the machine that runs the Splunk Enterprise instance, up to and including the root user.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Do I Reduce Security Tool Sprawl in My Environment? πŸ•΄

When it comes to tool consolidation, focus on platforms over products.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Jetpack WordPress Plug-in API Bug Triggers Mass Updates πŸ•΄

An audit uncovers an API-related security vulnerability dating back to Jetpack version 2.0 released in 2012 β€” and it affects millions of websites.

πŸ“– Read

via "Dark Reading".
❀1
β€Ό CVE-2023-34339 β€Ό

In JetBrains Ktor before 2.3.1 headers containing authentication data could be added to the exception's message

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Amazon Pays $30.8M to Settle Ring Spying & Alexa Privacy Lawsuits πŸ•΄

The global e-commerce company will pay millions of dollars in two separate lawsuits because of privacy and security violations, the FTC says.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Tel Aviv Stock Exchange Selects CardinalOps to Reduce Risk of Breaches Due to Undetected Attacks πŸ•΄

Enables financial services firm to operationalize MITRE ATT&CK with Splunk and eliminate detection coverage gaps based on organizational risk and priorities.

πŸ“– Read

via "Dark Reading".