πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-3303 β€Ό

Improper Access Control in GitHub repository admidio/admidio prior to 4.2.9.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep140: So you think you know ransomware? ⚠

Lots to learn this week - listen now! (Full transcript inside.)

πŸ“– Read

via "Naked Security".
⚠ Aussie PM says, β€œShut down your phone every 24 hours for 5 mins” – but that’s not enough on its own ⚠

Don't treat rebooting your phone once a day as a cybersecurity talisman... here are 8 additional tips for better mobile phone security.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-36274 β€Ό

LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36271 β€Ό

LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_wcs2nlen at bits.c.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Black Hat Asia 2023: Cybersecurity Maturity and Concern in Asia πŸ•΄

Black Hat Asia 2023 showed that cybersecurity is nascent among organizations in Asia with opportunities for improvement.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft Teams Attack Skips the Phish to Deliver Malware Directly πŸ•΄

Exploiting a flaw in how the app handles communication with external tenants gives threat actors an easy way to send malicious files from a trusted source to an organization's employees, but no patch is imminent.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Why Legacy System Users Prioritize Uptime Over Security πŸ•΄

For line-of-business execs, the fear of grinding mission-critical systems to a halt overrides the fear of ransomware. How can CISOs overcome this?

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-34466 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 5.0-milestone-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, tags from pages not viewable to the current user are leaked by the tags API. This information can also be exploited to infer the document reference of non-viewable pages. This vulnerability has been patched in XWiki 14.4.8, 14.10.4, and 15.0-rc-1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35151 β€Ό

XWiki Platform is a generic wiki platform. Starting in version 7.3-milestone-1 and prior to versions 14.4.8, 14.10.6, and 15.1, ny user can call a REST endpoint and obtain the obfuscated passwords, even when the mail obfuscation is activated. The issue has been patched in XWiki 14.4.8, 14.10.6, and 15.1. There is no known workaround.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ•΄ Suspicious Smartwatches Mailed to US Army Personnel πŸ•΄

Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-42807 β€Ό

A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13. A user may accidentally add a participant to a Shared Album by pressing the Delete key

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-35159 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the deletespace template to perform a XSS, e.g. by using URL such as: > xwiki/bin/deletespace/Sandbox/?xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 3.4-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-42834 β€Ό

An access issue was addressed with improved access restrictions. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13, macOS Big Sur 11.7.3. An app may be able to access mail folder attachments through a temporary directory used during compression

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28202 β€Ό

This issue was addressed with improved state management. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5, tvOS 16.5. An app firewall setting may not take effect after exiting the Settings app

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32404 β€Ό

This issue was addressed with improved entitlements. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5. An app may be able to bypass Privacy preferences

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32417 β€Ό

This issue was addressed by restricting options offered on a locked device. This issue is fixed in watchOS 9.5. An attacker with physical access to a locked Apple Watch may be able to view user photos or contacts via accessibility features

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32413 β€Ό

A race condition was addressed with improved state handling. This issue is fixed in watchOS 9.5, iOS 15.7.6 and iPadOS 15.7.6, macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to gain root privileges

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ NSA: BlackLotus BootKit Patching Won't Prevent Compromise πŸ•΄

It's unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023 πŸ•΄

Integration provides threat intel teams with an early warning system for geopolitical events that could trigger cyberattacks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-35165 β€Ό

AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. In the packages `aws-cdk-lib` 2.0.0 until 2.80.0 and `@aws-cdk/aws-eks` 1.57.0 until 1.202.0, `eks.Cluster` and `eks.FargateCluster` constructs create two roles, `CreationRole` and `default MastersRole`, that have an overly permissive trust policy. The first, referred to as the `CreationRole`, is used by lambda handlers to create the cluster and deploy Kubernetes resources (e.g `KubernetesManifest`, `HelmChart`, ...) onto it. Users with CDK version higher or equal to 1.62.0 (including v2 users) may be affected. The second, referred to as the `default MastersRole`, is provisioned only if the `mastersRole` property isn't provided and has permissions to execute `kubectl` commands on the cluster. Users with CDK version higher or equal to 1.57.0 (including v2 users) may be affected.The issue has been fixed in `@aws-cdk/aws-eks` v1.202.0 and `aws-cdk-lib` v2.80.0. These versions no longer use the account root principal. Instead, they restrict the trust policy to the specific roles of lambda handlers that need it. There is no workaround available for CreationRole. To avoid creating the `default MastersRole`, use the `mastersRole` property to explicitly provide a role.

πŸ“– Read

via "National Vulnerability Database".