π¦Ώ Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives π¦Ώ
π Read
via "Tech Republic".
This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials.π Read
via "Tech Republic".
TechRepublic
Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives
This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials.
π΄ Russian-African Security Gathering Exposes Kremlin's Reduced Influence π΄
π Read
via "Dark Reading".
Messaging from joint summit in Saint Petersburg amounts to little more than "diplomatic subterfuge," observers note.π Read
via "Dark Reading".
Dark Reading
Russian-African Security Gathering Exposes Kremlin's Reduced Influence
Messaging from joint summit in Saint Petersburg amounts to little more than "diplomatic subterfuge," observers note.
π΄ What's New in the NIST Cybersecurity Framework 2.0 π΄
π Read
via "Dark Reading".
Update to the NIST framework adds new "govern" function for cybersecurity.π Read
via "Dark Reading".
Dark Reading
What's New in the NIST Cybersecurity Framework 2.0
Update to the NIST framework adds new "govern" function for cybersecurity.
βΌ CVE-2023-39293 βΌ
π Read
via "National Vulnerability Database".
A Command Injection vulnerability has been identified in the MiVoice Office 400 SMB Controller through 1.2.5.23 which could allow a malicious actor to execute arbitrary commands within the context of the system.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38721 βΌ
π Read
via "National Vulnerability Database".
The IBM i 7.2, 7.3, 7.4, and 7.5 product Facsimile Support for i contains a local privilege escalation vulnerability. A malicious actor could gain access to a command line with elevated privileges allowing root access to the host operating system. IBM X-Force ID: 262173.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40312 βΌ
π Read
via "National Vulnerability Database".
Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload.Γ The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanksΓ Jordi Miralles Comins for reporting this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2023-29468 βΌ
π Read
via "National Vulnerability Database".
The Texas Instruments (TI) WiLink WL18xx MCP driver does not limit the number of information elements (IEs) of type XCC_EXT_1_IE_ID or XCC_EXT_2_IE_ID that can be parsed in a management frame. Using a specially crafted frame, a buffer overflow can be triggered that can potentially lead to remote code execution. This affects WILINK8-WIFI-MCP8 version 8.5_SP3 and earlier.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28481 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Tigergraph Enterprise 3.7.0. There is unsecured write access to SSH authorized keys file. Any code running as the tigergraph user is able to add their SSH public key into the authorised keys file. This allows an attacker to obtain password-less SSH key access by using their own SSH key.π Read
via "National Vulnerability Database".
βΌ CVE-2023-32748 βΌ
π Read
via "National Vulnerability Database".
The Linux DVS server component of Mitel MiVoice Connect through 19.3 SP2 (22.24.1500.0) could allow an unauthenticated attacker with internal network access to execute arbitrary scripts due to improper access control.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39292 βΌ
π Read
via "National Vulnerability Database".
A SQL Injection vulnerability has been identified in the MiVoice Office 400 SMB Controller through 1.2.5.23 which could allow a malicious actor to access sensitive information and execute arbitrary database and management operations.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40360 βΌ
π Read
via "National Vulnerability Database".
QEMU through 8.0.4 accesses a NULL pointer in nvme_directive_receive in hw/nvme/ctrl.c because there is no check for whether an endurance group is configured before checking whether Flexible Data Placement is enabled.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2023-28483 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Tigergraph Enterprise 3.7.0. The GSQL query language provides users with the ability to write data to files on a remote TigerGraph server. The locations that a query is allowed to write to are configurable via the GSQL.FileOutputPolicy configuration setting. GSQL queries that contain UDFs can bypass this configuration setting and, as a consequence, can write to any file location to which the administrative user has access.π Read
via "National Vulnerability Database".
βΌ CVE-2023-0872 βΌ
π Read
via "National Vulnerability Database".
The Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege.Γ The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.OpenNMS thanksΓ Erik Wynter for reporting this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40311 βΌ
π Read
via "National Vulnerability Database".
Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanksΓ Jordi Miralles Comins for reporting this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39908 βΌ
π Read
via "National Vulnerability Database".
The PKCS11 module of the YubiHSM 2 SDK through 2023.01 does not properly validate the length of specific read operations on object metadata. This may lead to disclosure of uninitialized and previously used memory.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28482 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Tigergraph Enterprise 3.7.0. A single TigerGraph instance can host multiple graphs that are accessed by multiple different users. The TigerGraph platform does not protect the confidentiality of any data uploaded to the remote server. In this scenario, any user that has permissions to upload data can browse data uploaded by any other user (irrespective of their permissions).π Read
via "National Vulnerability Database".
π1
βΌ CVE-2023-38741 βΌ
π Read
via "National Vulnerability Database".
IBM TXSeries for Multiplatforms 8.1, 8.2, and 9.1 is vulnerable to a denial of service, caused by improper enforcement of the timeout on individual read operations. By conducting a slowloris-type attacks, a remote attacker could exploit this vulnerability to cause a denial of service. IBM X-Force ID: 262905.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28480 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Tigergraph Enterprise 3.7.0. The TigerGraph platform allows users to define new User Defined Functions (UDFs) from C/C++ code. To support this functionality TigerGraph allows users to upload custom C/C++ code which is then compiled and installed into the platform. An attacker who has filesystem access on a remote TigerGraph system can alter the behavior of the database against the will of the database administrator; thus effectively bypassing the built in RBAC controls.π Read
via "National Vulnerability Database".
π¦Ώ 5 Tips for Securing Data When Using a Personal Mac for Work π¦Ώ
π Read
via "Tech Republic".
Discover strategies for securing data on your personal Mac for work tasks. Learn how to protect your device against potential threats.π Read
via "Tech Republic".
TechRepublic
5 Tips for Securing Data When Using a Personal Mac for Work
Discover strategies for securing data on your personal Mac for work tasks. Learn how to protect your device against potential threats.
βοΈ Diligere, Equity-Invest Are New Firms of U.K. Con Man βοΈ
π Read
via "Krebs on Security".
John Clifton Davies, a convicted fraudster estimated to have bilked dozens of technology startups out of more than $30 million through phony investment schemes, has a brand new pair of scam companies that are busy dashing startup dreams: A fake investment firm called Equity-Invest[.]ch, and Diligere[.]co.uk, a scam due diligence company that Equity-Invest insists all investment partners use.A native of the United Kingdom, Mr. Davies absconded from justice before being convicted on multiple counts of fraud in 2015. Prior to his conviction, Davies served 16 months in jail before being cleared on suspicion of murdering his third wife on their honeymoon in India.π Read
via "Krebs on Security".
Krebs on Security
Diligere, Equity-Invest Are New Firms of U.K. Con Man
John Clifton Davies, a convicted fraudster estimated to have bilked dozens of technology startups out of more than $30 million through phony investment schemes, has a brand new pair of scam companies that are busy dashing startup dreams: A fakeβ¦
π΄ Phishing Operators Make Ready Use of Abandoned Websites for Bait π΄
π Read
via "Dark Reading".
Abandoned sites β like Wordpress β are easy to break into, offer a legitimate looking cover, and can remain active for longer than average.π Read
via "Dark Reading".
Dark Reading
Phishing Operators Make Ready Use of Abandoned Websites for Bait
Abandoned sites β like Wordpress β are easy to break into, offer a legitimate looking cover, and can remain active for longer than average.