🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Patch Now: Cisco AnyConnect Bug Exploit Released in the Wild 🕴

A ready-made, low-complexity path to pwning the popular enterprise VPN clients for remote workers is now circulating in the wild.

📖 Read

via "Dark Reading".
CVE-2023-36362

An issue in the rel_sequences component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.

📖 Read

via "National Vulnerability Database".
CVE-2023-36370

An issue in the gc_col component of MonetDB Server v11.45.17 and v11.46.0 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.

📖 Read

via "National Vulnerability Database".
S3 Ep140: So you think you know ransomware?

Lots to learn this week - listen now! (Full transcript inside.)

📖 Read

via "Naked Security".
🕴 5 Steps for Minimizing Dark Data Risk 🕴

Dark data may be your most elusive asset, but it can also be your most costly if you don't protect it.

📖 Read

via "Dark Reading".
CVE-2023-2611

Advantech R-SeeNet versions 2.4.22 is installed with a hidden root-level user that is not available in the users list. This hidden user has a password that cannot be changed by users.

📖 Read

via "National Vulnerability Database".
CVE-2023-3256

Advantech R-SeeNet versions 2.4.22 allows low-level users to access and load the content of local files.

📖 Read

via "National Vulnerability Database".
🕴 Azure AD 'Log in With Microsoft' Authentication Bypass Affects Thousands 🕴

The "nOAuth" attack allows cross-platform spoofing and full account takeovers, and enterprises need to remediate the issue immediately, researchers warn.

📖 Read

via "Dark Reading".
♟️ SMS Phishers Harvested Phone Numbers, Shipment Data from UPS Tracking Tool ♟️

The United Parcel Service (UPS) says fraudsters have been harvesting phone numbers and other information from its online shipment tracking tool in Canada to send highly targeted SMS phishing (a.k.a. "smishing") messages that spoofed UPS and other top brands. The missives addressed recipients by name, included details about recent orders, and warned that those orders wouldn't be shipped unless the customer paid an added delivery fee.

📖 Read

via "Krebs on Security".
🕴 Even With No Recession, Smaller Firms Aim to Consolidate Security Tools 🕴

Small and midsized companies work to jettison some security tools to simplify operations and reduce cost, even as any economic downturn continues to remain at bay.

📖 Read

via "Dark Reading".
🕴 Tanium Platform Advances Threat Identification Capabilities and Enhances Endpoint Reach 🕴

Award-winning XEM platform introduces advanced SBOM capabilities, expanded ARM support, and additional Risk & Compliance improvements.

📖 Read

via "Dark Reading".
CVE-2023-36243

FLVMeta v1.2.1 was discovered to contain a buffer overflow via the xml_on_metadata_tag_only function at dump_xml.c.

📖 Read

via "National Vulnerability Database".
CVE-2023-34923

XML Signature Wrapping (XSW) in SAML-based Single Sign-on feature in TOPdesk v12.10.12 allows bad actors with credentials to authenticate with the Identity Provider (IP) to impersonate any TOPdesk user via SAML Response manipulation.

📖 Read

via "National Vulnerability Database".
🕴 Former Duo Security Co-Founder Jon Oberheide Joins DNSFilter Board of Directors 🕴

Cybersecurity expert and proven entrepreneur to help protective DNS leader drive vision and scale through hypergrowth.

📖 Read

via "Dark Reading".
🕴 Sumsub Launches Advanced Deepfakes Detector 🕴

Full-cycle verification platform enhances its facial biometrics verification with innovative deepfake detection technology; shares new 2023 identity fraud trends.

📖 Read

via "Dark Reading".
🕴 Growing SaaS Usage Means Larger Attack Surface 🕴

Software-as-a-service expands an organization's attack surface, and security teams need to understand how to address those risks.

📖 Read

via "Dark Reading".
🕴 Job Seekers, Look Out for Job Scams 🕴

Scammers are setting out lures for people looking for work. If a position sounds too good to be true, it probably is.

📖 Read

via "Dark Reading".
CVE-2023-3128

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

📖 Read

via "National Vulnerability Database".
CVE-2023-2991

Fortra Globalscape EFT's administration server suffers from an information disclosure vulnerability where the serial number of the harddrive that Globalscape is installed on can be remotely determined via a "trial extension request" message

📖 Read

via "National Vulnerability Database".
CVE-2023-34110

Flask-AppBuilder is an application development framework, built on top of Flask. Prior to version 4.3.2, an authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed password. This vulnerability has been fixed in version 4.3.2.

📖 Read

via "National Vulnerability Database".
CVE-2023-34462

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler`. This vulnerability has been fixed in version 4.1.94.Final.

📖 Read

via "National Vulnerability Database".