πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-0668 β€Ό

Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36696 β€Ό

The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_downloads() function in versions up to, and including, 1.2.6. This makes it possible for unauthenticated attackers to download files from the vulnerable service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36700 β€Ό

The Page Builder: KingComposer plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 2.9.3. This is due to a security nonce being leaked in the '/wp-admin/index.php' page. This makes it possible for authenticated attackers to change arbitrary WordPress options, delete arbitrary files/folders, and inject arbitrary content.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-30576 β€Ό

Apache Guacamole 0.9.10 through 1.5.1 may continue to reference a freed RDP audio input buffer. Depending on timing, this may allow an attacker to execute arbitrary code with the privileges of the guacd process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2186 β€Ό

On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ MOVEit cyber attack: Cl0p sparks speculation that it’s lost control of hack πŸ“’

The hackers return with their second major data-extortion attack of 2023, but may have bitten off more than they can chew

πŸ“– Read

via "ITPro".
πŸ“’ Security consolidation is about improving results, not just cost savings πŸ“’

Channel partners can play a key role in enabling businesses to consolidate security operations and bolster resilience

πŸ“– Read

via "ITPro".
β€Ό CVE-2023-3140 β€Ό

Missing HTTP headers (X-Frame-Options, Content-Security-Policy) in KNIME Business Hub before 1.4.0 has left users vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server.

πŸ“– Read

via "National Vulnerability Database".
❀1
πŸ•΄ Cisco Touts New AI-Based Security, SSE Features πŸ•΄

Cisco laid out its AI plans and a vision for unified cloud security during Cisco Live 2023.

πŸ“– Read

via "Dark Reading".
πŸ‘1
⚠ Chrome zero-day: β€œThis exploit is in the wild”, so check your version now ⚠

Chrome 0-day patched now, Edge patch coming soon.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Case for a Federal Cyber-Insurance Backstop πŸ•΄

By stepping in to provide aid, the federal government could help protect companies, insurers, and the economy from the impact of a widespread, catastrophic cyberattack.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-4380 β€Ό

The Pinterest Automatic plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the 'wp_pinterest_automatic_parse_request' function and the 'process_form.php' script in versions up to, and including, 1.14.3. This makes it possible for unauthenticated attackers to update arbitrary options on a site that can be used to create new administrative user accounts or redirect unsuspecting site visitors.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ FBI: Sextortionist Campaigns Use Deepfakes to Target Children, Adults πŸ•΄

Threat actors are lifting public images and videos from the Internet, altering them, and posting them online in a new wave of sextortion campaigns.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-3145 β€Ό

A vulnerability, which was classified as critical, has been found in SourceCodester Online Discussion Forum Site 1.0. Affected by this issue is some unknown functionality of the file classes\Users.php?f=registration. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-231014 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33498 β€Ό

alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Falco 0.35.0 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Cyber Essentialism & 'Doing Less With Less' πŸ•΄

Cybersecurity benefits from a focus on the vital few chores rather than the trivial many. Find the "right things" to encourage strategic thinking, then move the culture needle to promote that policy.

πŸ“– Read

via "Dark Reading".
⚠ Firefox 114 is out: No 0-days, but one fascinating β€œteachable moment” bug ⚠

With the right (or wrong, if you're on the right side of the fence) timing...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-1825 β€Ό

An issue has been discovered in GitLab EE affecting all versions starting from 15.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. It was possible to disclose issue notes to an unauthorized user at project export.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘Ž1
β€Ό CVE-2023-3146 β€Ό

A vulnerability, which was classified as critical, was found in SourceCodester Online Discussion Forum Site 1.0. This affects an unknown part of the file admin\categories\manage_category.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231015.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Fined $20M For Xbox Child Data Collection πŸ•΄

The FTC has demanded additional data privacy protections for kids using Xbox gaming systems, extending COPPA protections.

πŸ“– Read

via "Dark Reading".