πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-34933 β€Ό

A stack overflow in the UpdateWanParams function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Generative AI Projects Pose Major Cybersecurity Risk to Enterprises πŸ•΄

Developers' enthusiasm for ChatGPT and other LLM tools leaves most organizations largely unprepared to defend against the vulnerabilities that the nascent technology creates.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Saudi Arabia's Cyber Capabilities Ranked Second Globally πŸ•΄

Saudi Arabia is one of the world's leaders in cybersecurity development and preparedness, according to the latest rankings.

πŸ“– Read

via "Dark Reading".
πŸ•΄ FIDO Alliance Publishes Guidance for Deploying Passkeys in the Enterprise πŸ•΄

Half-day virtual Authenticate Summit to educate on how passkeys can fit into a variety of enterprise environments.

πŸ“– Read

via "Dark Reading".
⚠ Interested in $10,000,000? Ready to turn in the Clop ransomware crew? ⚠

Technically, it's "up to $10 million", but it's potentially a LOT of money, nevertheless...

πŸ“– Read

via "Naked Security".
πŸ•΄ Malwarebytes ChatGPT Survey Reveals 81% are Concerned by Generative AI Security Risks πŸ•΄

Survey also uncovers 63% of respondents distrust ChatGPT while 51% question AI's ability to improve Internet safety.

πŸ“– Read

via "Dark Reading".
πŸ‘1
β€Ό CVE-2023-2625 β€Ό

A vulnerability exists that can be exploited by an authenticated client that is connected to the same network segment as the CoreTec 4, having any level of access VIEWER to ADMIN. To exploit the vulnerability the attacker can inject shell commands through a particular field of the web user interface that will be executed by the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27866 β€Ό

IBM Informix JDBC Driver 4.10 and 4.50 is susceptible to remote code execution attack via JNDI injection when driver code or the application using the driver do not verify supplied LDAP URL in Connect String. IBM X-Force ID: 249511.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cato Networks Revolutionizes Network Security With Real-Time, Machine Learning-Powered Protection πŸ•΄

The combination of data science expertise, cloud resources, and Cato's vast data lake enables real-time, ML-powered protection against evasive cyberattacks, reducing risk and improving security.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Astrix Security Raises $25M in Series A Funding πŸ•΄

The investment will allow enterprises to further secure non-human identities and safely leverage the soaring adoption of third-party apps and Generative AI services.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Social Engineering Adds Depth to Red Team Exercises πŸ•΄

Because social engineering usually succeeds, companies need to test whether their defenses can block adversaries that gain employees' trust.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-21179 β€Ό

In parseSecurityParamsFromXml of XmlUtil.java, there is a possible bypass of user specified wifi encryption protocol due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-272755865

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21152 β€Ό

In FaceStatsAnalyzer::InterpolateWeightList of face_stats_analyzer.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-269174022References: N/A

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21156 β€Ό

In BuildGetRadioNode of protocolmiscbulider.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the modem with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264540759References: N/A

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21154 β€Ό

In StoreAdbSerialNumber of protocolmiscbuilder.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783910References: N/A

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21185 β€Ό

In multiple functions of WifiNetworkFactory.java, there is a missing permission check. This could lead to local escalation of privilege from the guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-266700762

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21150 β€Ό

In handle_set_parameters_ctrl of hal_socket.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-267312009References: N/A

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21178 β€Ό

In installKey of KeyUtil.cpp, there is a possible failure of file encryption due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-140762419

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21146 β€Ό

there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239867994References: N/A

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21147 β€Ό

In lwis_i2c_device_disable of lwis_device_i2c.c, there is a possible UAF due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-269661912References: N/A

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21151 β€Ό

In the Google BMS kernel module, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-265149414References: N/A

πŸ“– Read

via "National Vulnerability Database".