βΌ CVE-2023-3303 βΌ
π Read
via "National Vulnerability Database".
Improper Access Control in GitHub repository admidio/admidio prior to 4.2.9.π Read
via "National Vulnerability Database".
β S3 Ep140: So you think you know ransomware? β
π Read
via "Naked Security".
Lots to learn this week - listen now! (Full transcript inside.)π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Aussie PM says, βShut down your phone every 24 hours for 5 minsβ β but thatβs not enough on its own β
π Read
via "Naked Security".
Don't treat rebooting your phone once a day as a cybersecurity talisman... here are 8 additional tips for better mobile phone security.π Read
via "Naked Security".
βΌ CVE-2023-36274 βΌ
π Read
via "National Vulnerability Database".
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36271 βΌ
π Read
via "National Vulnerability Database".
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_wcs2nlen at bits.c.π Read
via "National Vulnerability Database".
π΄ Black Hat Asia 2023: Cybersecurity Maturity and Concern in Asia π΄
π Read
via "Dark Reading".
Black Hat Asia 2023 showed that cybersecurity is nascent among organizations in Asia with opportunities for improvement.π Read
via "Dark Reading".
Dark Reading
Black Hat Asia 2023: Cybersecurity Maturity and Concern in Asia
Black Hat Asia 2023 showed that cybersecurity is nascent among organizations in Asia with opportunities for improvement.
π΄ Microsoft Teams Attack Skips the Phish to Deliver Malware Directly π΄
π Read
via "Dark Reading".
Exploiting a flaw in how the app handles communication with external tenants gives threat actors an easy way to send malicious files from a trusted source to an organization's employees, but no patch is imminent.π Read
via "Dark Reading".
Dark Reading
Microsoft Teams Attack Skips the Phish to Deliver Malware Directly
Exploiting a flaw in how the app handles communication with external tenants gives threat actors an easy way to send malicious files from a trusted source to an organization's employees, but no patch is imminent.
π΄ Why Legacy System Users Prioritize Uptime Over Security π΄
π Read
via "Dark Reading".
For line-of-business execs, the fear of grinding mission-critical systems to a halt overrides the fear of ransomware. How can CISOs overcome this?π Read
via "Dark Reading".
Dark Reading
Why Legacy System Users Prioritize Uptime Over Security
For line-of-business execs, the fear of mission-critical systems grinding to a halt overrides their cybersecurity concerns. How can CISOs overcome this?
βΌ CVE-2023-34466 βΌ
π Read
via "National Vulnerability Database".
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 5.0-milestone-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, tags from pages not viewable to the current user are leaked by the tags API. This information can also be exploited to infer the document reference of non-viewable pages. This vulnerability has been patched in XWiki 14.4.8, 14.10.4, and 15.0-rc-1.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35151 βΌ
π Read
via "National Vulnerability Database".
XWiki Platform is a generic wiki platform. Starting in version 7.3-milestone-1 and prior to versions 14.4.8, 14.10.6, and 15.1, ny user can call a REST endpoint and obtain the obfuscated passwords, even when the mail obfuscation is activated. The issue has been patched in XWiki 14.4.8, 14.10.6, and 15.1. There is no known workaround.π Read
via "National Vulnerability Database".
π1
π΄ Suspicious Smartwatches Mailed to US Army Personnel π΄
π Read
via "Dark Reading".
Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise. π Read
via "Dark Reading".
Dark Reading
Suspicious Smartwatches Mailed to US Army Personnel
Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise.
βΌ CVE-2022-42807 βΌ
π Read
via "National Vulnerability Database".
A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13. A user may accidentally add a participant to a Shared Album by pressing the Delete keyπ Read
via "National Vulnerability Database".
β€1
βΌ CVE-2023-35159 βΌ
π Read
via "National Vulnerability Database".
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the deletespace template to perform a XSS, e.g. by using URL such as: > xwiki/bin/deletespace/Sandbox/?xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 3.4-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.π Read
via "National Vulnerability Database".
βΌ CVE-2022-42834 βΌ
π Read
via "National Vulnerability Database".
An access issue was addressed with improved access restrictions. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13, macOS Big Sur 11.7.3. An app may be able to access mail folder attachments through a temporary directory used during compressionπ Read
via "National Vulnerability Database".
βΌ CVE-2023-28202 βΌ
π Read
via "National Vulnerability Database".
This issue was addressed with improved state management. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5, tvOS 16.5. An app firewall setting may not take effect after exiting the Settings appπ Read
via "National Vulnerability Database".
βΌ CVE-2023-32404 βΌ
π Read
via "National Vulnerability Database".
This issue was addressed with improved entitlements. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5. An app may be able to bypass Privacy preferencesπ Read
via "National Vulnerability Database".
βΌ CVE-2023-32417 βΌ
π Read
via "National Vulnerability Database".
This issue was addressed by restricting options offered on a locked device. This issue is fixed in watchOS 9.5. An attacker with physical access to a locked Apple Watch may be able to view user photos or contacts via accessibility featuresπ Read
via "National Vulnerability Database".
βΌ CVE-2023-32413 βΌ
π Read
via "National Vulnerability Database".
A race condition was addressed with improved state handling. This issue is fixed in watchOS 9.5, iOS 15.7.6 and iPadOS 15.7.6, macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to gain root privilegesπ Read
via "National Vulnerability Database".
π΄ NSA: BlackLotus BootKit Patching Won't Prevent Compromise π΄
π Read
via "Dark Reading".
It's unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments.π Read
via "Dark Reading".
Dark Reading
NSA: BlackLotus BootKit Patching Won't Prevent Compromise
It's unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments.
π΄ Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023 π΄
π Read
via "Dark Reading".
Integration provides threat intel teams with an early warning system for geopolitical events that could trigger cyberattacks.π Read
via "Dark Reading".
Dark Reading
Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023
Integration provides threat intel teams with an early warning system for geopolitical events that could trigger cyberattacks.
βΌ CVE-2023-35165 βΌ
π Read
via "National Vulnerability Database".
AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. In the packages `aws-cdk-lib` 2.0.0 until 2.80.0 and `@aws-cdk/aws-eks` 1.57.0 until 1.202.0, `eks.Cluster` and `eks.FargateCluster` constructs create two roles, `CreationRole` and `default MastersRole`, that have an overly permissive trust policy. The first, referred to as the `CreationRole`, is used by lambda handlers to create the cluster and deploy Kubernetes resources (e.g `KubernetesManifest`, `HelmChart`, ...) onto it. Users with CDK version higher or equal to 1.62.0 (including v2 users) may be affected. The second, referred to as the `default MastersRole`, is provisioned only if the `mastersRole` property isn't provided and has permissions to execute `kubectl` commands on the cluster. Users with CDK version higher or equal to 1.57.0 (including v2 users) may be affected.The issue has been fixed in `@aws-cdk/aws-eks` v1.202.0 and `aws-cdk-lib` v2.80.0. These versions no longer use the account root principal. Instead, they restrict the trust policy to the specific roles of lambda handlers that need it. There is no workaround available for CreationRole. To avoid creating the `default MastersRole`, use the `mastersRole` property to explicitly provide a role.π Read
via "National Vulnerability Database".