πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-32267 β€Ό

A potential vulnerability has been identified in OpenText / Micro Focus ArcSight Management Center. The vulnerability could be remotely exploited.

πŸ“– Read

via "National Vulnerability Database".
🦿 Best Encryption Software and Tools for 2023 🦿

This is a comprehensive list of best encryption software and tools, covering their features, pricing and more. Use this guide to determine your best fit.

πŸ“– Read

via "Tech Republic".
πŸ€”1
🦿 Downfall Vulnerability Affects Millions of Intel CPUs With Strong Data Leak Impact 🦿

Learn technical details about this newly disclosed security vulnerability, as well as mitigation recommendations from the Google researcher who discovered it.

πŸ“– Read

via "Tech Republic".
πŸ•΄ XWorm, Remcos RAT Evade EDRs to Infect Critical Infrastructure πŸ•΄

Disguised as harmless PDF documents, LNK files trigger a PowerShell script, initiating a Rust-based injector called Freeze[.]rs and a host of malware infections.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-0871 β€Ό

XXE injection in /rtc/post/ endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platformsΓ‚ is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services.Γ‚ The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.

πŸ“– Read

via "National Vulnerability Database".
🦿 Dependency Confusion Attacks: New Research Into Which Businesses are At Risk 🦿

Dependency confusion is becoming a serious cybersecurity threat. Learn which organizations are at risk and how to protect systems against these attacks.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Threat Intelligence Efforts, Investment Lagging, Says Opswat πŸ•΄

In an annual survey, 62% of respondents admited their threat intel efforts need stepping up.

πŸ“– Read

via "Dark Reading".
πŸ•΄ As Phishing Gets Even Sneakier, Browser Security Needs to Step Up πŸ•΄

Perception Point's Din Serussi says browser extensions can help mitigate more sophisticated phishing techniques.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Fortinet Announces Free Security Awareness Curriculum for K-12 Students Tied to White House's Cyber Initiatives πŸ•΄



πŸ“– Read

via "Dark Reading".
πŸ•΄ Security Pressures Mount Around AI's Promises & Peril πŸ•΄

Both threats to enterprises and career opportunities are being created by the escalation of generative AI and ChatGPT, warns Maria 'Azeria' Markstedter.

πŸ“– Read

via "Dark Reading".
🦿 Minimizing Risk Through Proactive Apple Device Management: Addigy 🦿

In this Executive Brief by Preetham Gurram, Vice President of Product, Addigy, learn how to proactively manage Apple devices.

πŸ“– Read

via "Tech Republic".
🦿 Black Hat USA 2023 Panel: Used Correctly, Generative AI is a Boon for Cybersecurity 🦿

A Black Hat 2023 panel discussed the ramifications of generative AI, and included the former Cyber Czar for the Obama administration.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2023-22955 β€Ό

An issue was discovered on AudioCodes VoIP desk phones through 3.4.4.1000. The validation of firmware images only consists of simple checksum checks for different firmware components. Thus, by knowing how to calculate and where to store the required checksums for the flasher tool, an attacker is able to store malicious firmware.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22956 β€Ό

An issue was discovered on AudioCodes VoIP desk phones through 3.4.4.1000. Due to the use of a hard-coded cryptographic key, an attacker is able to decrypt encrypted configuration files and retrieve sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22957 β€Ό

An issue was discovered in libac_des3.so on AudioCodes VoIP desk phones through 3.4.4.1000. Due to the use of hard-coded cryptographic key, an attacker with access to backup or configuration files is able to decrypt encrypted values and retrieve sensitive information, e.g., the device root password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3452 β€Ό

The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4293 β€Ό

The Premium Packages - Sell Digital Products Securely plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.7.4 due to insufficient restriction on the 'wpdmpp_update_profile' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'profile[role]' parameter during a profile update.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4265 β€Ό

Potential buffer overflow vulnerabilities in the following locations: https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis... https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis.c#L841

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39402 β€Ό

Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39396 β€Ό

Deserialization vulnerability in the input module. Successful exploitation of this vulnerability may affect availability.

πŸ“– Read

via "National Vulnerability Database".