πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ S3 Ep137: 16th century crypto skullduggery ⚠

Lots to learn, clearly explained in plain English... listen now! (Full transcript inside.)

πŸ“– Read

via "Naked Security".
⚠ Serious Security: That KeePass β€œmaster password crack”, and what we can learn from it ⚠

Here, in an admittedly discursive nutshell, is the fascinating story of CVE-2023-32784. (Short version: Don't panic.)

πŸ“– Read

via "Naked Security".
πŸ•΄ Where SBOMs Stand Today πŸ•΄

It's been two years since Executive Order 14028. By using SBOMs as a standard, organizations can manage software risks, protect their reputation, and improve their cybersecurity posture.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Novel PyPI Malware Uses Compiled Python Bytecode to Evade Detection πŸ•΄

In an already fraught environment surrounding the popular Python programming language software package manager, hackers are coming up with new ways to sneak malicious goodies past cybersecurity buffers.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace πŸ•΄

No activity logging in the free subscription for Google's Web-based productivity suite exposes enterprises to insider and other threats, researchers say.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Sustained 'Red Deer' Phishing Attacks Impersonate Israel Post, Drop RATs πŸ•΄

The "missed package" phishing messages, likely the work of a hacking-for-hire group, bounds into inboxes, bearing ASyncRAT.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-32310 β€Ό

DataEase is an open source data visualization and analysis tool. The API interface for DataEase delete dashboard and delete system messages is vulnerable to insecure direct object references (IDOR). This could result in a user deleting another user's dashboard or messages or interfering with the interface for marking messages read. The vulnerability has been fixed in v1.18.7. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32713 β€Ό

In Splunk App for Stream versions below 8.1.1, a low-privileged user could use a vulnerability in the streamfwd process within the Splunk App for Stream to escalate their privileges on the machine that runs the Splunk Enterprise instance, up to and including the root user.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Do I Reduce Security Tool Sprawl in My Environment? πŸ•΄

When it comes to tool consolidation, focus on platforms over products.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Jetpack WordPress Plug-in API Bug Triggers Mass Updates πŸ•΄

An audit uncovers an API-related security vulnerability dating back to Jetpack version 2.0 released in 2012 β€” and it affects millions of websites.

πŸ“– Read

via "Dark Reading".
❀1
β€Ό CVE-2023-34339 β€Ό

In JetBrains Ktor before 2.3.1 headers containing authentication data could be added to the exception's message

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Amazon Pays $30.8M to Settle Ring Spying & Alexa Privacy Lawsuits πŸ•΄

The global e-commerce company will pay millions of dollars in two separate lawsuits because of privacy and security violations, the FTC says.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Tel Aviv Stock Exchange Selects CardinalOps to Reduce Risk of Breaches Due to Undetected Attacks πŸ•΄

Enables financial services firm to operationalize MITRE ATT&CK with Splunk and eliminate detection coverage gaps based on organizational risk and priorities.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cyversity and United Airlines to Provide Cybersecurity Training Scholarships to Cyversity Members πŸ•΄

Program designed to equip women and underrepresented individuals with the necessary skills and knowledge to succeed in cybersecurity.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-29723 β€Ό

The Glitter Unicorn Wallpaper app for Android 7.0 thru 8.0 allows unauthorized applications to actively request permission to insert data into the database that records information about a user's personal preferences and will be loaded into memory to be read and used when the application is opened. By injecting data, the attacker can force the application to load malicious image URLs and display them in the UI. As the amount of data increases, it will eventually cause the application to trigger an OOM error and crash, resulting in a persistent denial of service attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29736 β€Ό

Keyboard Themes 1.275.1.164 for Android contains a dictionary traversal vulnerability that allows unauthorized apps to overwrite arbitrary files in its internal storage and achieve arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-29725 β€Ό

The BT21 x BTS Wallpaper app 12 for Android allows unauthorized applications to actively request permission to insert data into the database that records information about a user's personal preferences and will be loaded into memory to be read and used when the application is opened. By injecting data, the attacker can force the application to load malicious image URLs and display them in the UI. As the amount of data increases, it will eventually cause the application to trigger an OOM error and crash, resulting in a persistent denial of service attack.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-29746 β€Ό

An issue found in The Thaiger v.1.2 for Android allows unauthorized apps to cause a code execution attack by manipulating the SharedPreference files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2835 β€Ό

The WP Directory Kit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search' parameter in versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯2
β€Ό CVE-2023-2060 β€Ό

Weak Password Requirements vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to access to the module via FTP by dictionary attack or password sniffing.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯1
πŸ“’ Horabot campaign targeted businesses for more than two years before finally being discovered πŸ“’

The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular

πŸ“– Read

via "ITPro".
πŸ‘1