πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2015-10112 β€Ό

A vulnerability classified as problematic has been found in WooFramework Branding Plugin up to 1.0.1 on WordPress. Affected is the function admin_screen_logic of the file wooframework-branding.php. The manipulation of the argument url leads to open redirect. It is possible to launch the attack remotely. Upgrading to version 1.0.2 is able to address this issue. The name of the patch is f12fccd7b5eaf66442346f748c901ef504742f78. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230652.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Play ransomware gang says it's behind attack on major Spanish bank πŸ“’

The Globalcaja incident marks the latest in a string of highly disruptive attacks waged by the Play ransomware group

πŸ“– Read

via "ITPro".
πŸ“’ Microsoft says it knows who was behind cyber attacks on MOVEit Transfer πŸ“’

Dozens of organizations may have already lost data to hackers exploiting the critical flaw

πŸ“– Read

via "ITPro".
πŸ•΄ After 'Inception' Attack, New Due Diligence Requirements Are Needed πŸ•΄

To stem supply chain attacks, forging a new dynamic of shared cybersecurity hygiene accountability is the right thing to do.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-27989 β€Ό

A buffer overflow vulnerability in the CGI program of the Zyxel NR7101 firmware versions prior to V1.00(ABUV.8)C0 could allow a remote authenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway πŸ•΄

With shades of the GoAnywhere attacks, a cyber threat actor linked to FIN11 is leveraging a bug in the widely used managed file transfer product to steal data from organizations in multiple countries.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-2572 β€Ό

The Survey Maker WordPress plugin before 3.4.7 does not escape some parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2472 β€Ό

The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.61 does not sanitise and escape a parameter before outputting it back in the admin dashboard when the WPML plugin is also active and configured, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Don't Overlook Twitter's Trove of Threat Intel for Enterprise Cybersecurity πŸ•΄

Social media data can provide critical clues to help get ahead of the next cyberattack, experts say.

πŸ“– Read

via "Dark Reading".
⚠ Researchers claim Windows β€œbackdoor” affects hundreds of Gigabyte motherboards ⚠

It's a backdoor, Jim, but not as we know it... here's a sober look at this issue.

πŸ“– Read

via "Naked Security".
❀2
⚠ MOVEit zero-day exploit used by data breach gangs: The how, the why, and what to do… ⚠

Little Bobby Tables is back!

πŸ“– Read

via "Naked Security".
πŸ•΄ Moonlighter Satellite Offers In-Orbit Target for Space Hackers πŸ•΄

Moonlighter, which offers red teams a chance at operational disruption, will be up for pwning at in August, timed with DEF CON.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2015-10113 β€Ό

A vulnerability classified as problematic was found in WooFramework Tweaks Plugin up to 1.0.1 on WordPress. Affected by this vulnerability is the function admin_screen_logic of the file wooframework-tweaks.php. The manipulation of the argument url leads to open redirect. The attack can be launched remotely. Upgrading to version 1.0.2 is able to address this issue. The identifier of the patch is 3b57d405149c1a59d1119da6e0bb8212732c9c88. It is recommended to upgrade the affected component. The identifier VDB-230653 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33693 β€Ό

A buffer overflow in EasyPlayerPro-Win v3.2.19.0106 to v3.6.19.0823 allows attackers to cause a Denial of Service (DoS) via a crafted XML file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29344 β€Ό

Microsoft Office Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
❀1
πŸ•΄ 2.5M Impacted by Enzo Biochem Data Leak After Ransomware Attack πŸ•΄

With the leak of information such as Social Security numbers, in addition to other protected information, 600,000 of the nearly 2.5 million affected are at risk for identity theft.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft Links MOVEit Attack to Cl0p as British Airways, BBC Fall πŸ•΄

Some billion-dollar organizations have already been identified as victims of the prolific ransomware group's latest exploit, amidst ongoing attacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution πŸ•΄

New AI feature enhances OnDOMAIN's capabilities to secure unknown vulnerabilities and strengthen network security posture.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-33409 β€Ό

Minical 1.0.0 is vulnerable to Cross Site Request Forgery (CSRF) via minical/public/application/controllers/settings/company.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19028 β€Ό

*File Upload vulnerability found in Emlog EmlogCMS v.6.0.0 allows a remote attacker to gain access to sensitive information via the /admin/plugin.php function.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-34103 β€Ό

Avo is an open source ruby on rails admin panel creation framework. In affected versions some avo fields are vulnerable to Cross Site Scripting (XSS) when rendering html based content. Attackers do need form edit privilege in order to successfully exploit this vulnerability, but the results are stored and no specific timing is required. This issue has been addressed in commit `7891c01e` which is expected to be included in the next release of avo. Users are advised to configure CSP headers for their application and to limit untrusted user access as a mitigation.

πŸ“– Read

via "National Vulnerability Database".