πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway πŸ•΄

With shades of the GoAnywhere attacks, a cyber threat actor linked to FIN11 is leveraging a bug in the widely used managed file transfer product to steal data from organizations in multiple countries.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-2572 β€Ό

The Survey Maker WordPress plugin before 3.4.7 does not escape some parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2472 β€Ό

The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.61 does not sanitise and escape a parameter before outputting it back in the admin dashboard when the WPML plugin is also active and configured, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Don't Overlook Twitter's Trove of Threat Intel for Enterprise Cybersecurity πŸ•΄

Social media data can provide critical clues to help get ahead of the next cyberattack, experts say.

πŸ“– Read

via "Dark Reading".
⚠ Researchers claim Windows β€œbackdoor” affects hundreds of Gigabyte motherboards ⚠

It's a backdoor, Jim, but not as we know it... here's a sober look at this issue.

πŸ“– Read

via "Naked Security".
❀2
⚠ MOVEit zero-day exploit used by data breach gangs: The how, the why, and what to do… ⚠

Little Bobby Tables is back!

πŸ“– Read

via "Naked Security".
πŸ•΄ Moonlighter Satellite Offers In-Orbit Target for Space Hackers πŸ•΄

Moonlighter, which offers red teams a chance at operational disruption, will be up for pwning at in August, timed with DEF CON.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2015-10113 β€Ό

A vulnerability classified as problematic was found in WooFramework Tweaks Plugin up to 1.0.1 on WordPress. Affected by this vulnerability is the function admin_screen_logic of the file wooframework-tweaks.php. The manipulation of the argument url leads to open redirect. The attack can be launched remotely. Upgrading to version 1.0.2 is able to address this issue. The identifier of the patch is 3b57d405149c1a59d1119da6e0bb8212732c9c88. It is recommended to upgrade the affected component. The identifier VDB-230653 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33693 β€Ό

A buffer overflow in EasyPlayerPro-Win v3.2.19.0106 to v3.6.19.0823 allows attackers to cause a Denial of Service (DoS) via a crafted XML file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29344 β€Ό

Microsoft Office Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
❀1
πŸ•΄ 2.5M Impacted by Enzo Biochem Data Leak After Ransomware Attack πŸ•΄

With the leak of information such as Social Security numbers, in addition to other protected information, 600,000 of the nearly 2.5 million affected are at risk for identity theft.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft Links MOVEit Attack to Cl0p as British Airways, BBC Fall πŸ•΄

Some billion-dollar organizations have already been identified as victims of the prolific ransomware group's latest exploit, amidst ongoing attacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution πŸ•΄

New AI feature enhances OnDOMAIN's capabilities to secure unknown vulnerabilities and strengthen network security posture.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-33409 β€Ό

Minical 1.0.0 is vulnerable to Cross Site Request Forgery (CSRF) via minical/public/application/controllers/settings/company.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19028 β€Ό

*File Upload vulnerability found in Emlog EmlogCMS v.6.0.0 allows a remote attacker to gain access to sensitive information via the /admin/plugin.php function.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-34103 β€Ό

Avo is an open source ruby on rails admin panel creation framework. In affected versions some avo fields are vulnerable to Cross Site Scripting (XSS) when rendering html based content. Attackers do need form edit privilege in order to successfully exploit this vulnerability, but the results are stored and no specific timing is required. This issue has been addressed in commit `7891c01e` which is expected to be included in the next release of avo. Users are advised to configure CSP headers for their application and to limit untrusted user access as a mitigation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-48181 β€Ό

An ErrorMessage driver stack-based buffer overflow vulnerability in BIOS of some ThinkPad models could allow an attacker with local access to elevate their privileges and execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22450 β€Ό

In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32628 β€Ό

In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to modify the file extension of a certificate file to ASP when uploading it, which can lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
⚠ MOVEit zero-day exploit used by data breach gangs: The how, the why, and what to do… ⚠

Little Bobby Tables is back!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-48441 β€Ό

In dialer service, there is a possible missing permission check. This could lead to local denial of service with no additional execution privileges.

πŸ“– Read

via "National Vulnerability Database".