πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives 🦿

This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Russian-African Security Gathering Exposes Kremlin's Reduced Influence πŸ•΄

Messaging from joint summit in Saint Petersburg amounts to little more than "diplomatic subterfuge," observers note.

πŸ“– Read

via "Dark Reading".
πŸ•΄ What's New in the NIST Cybersecurity Framework 2.0 πŸ•΄

Update to the NIST framework adds new "govern" function for cybersecurity.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-39293 β€Ό

A Command Injection vulnerability has been identified in the MiVoice Office 400 SMB Controller through 1.2.5.23 which could allow a malicious actor to execute arbitrary commands within the context of the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38721 β€Ό

The IBM i 7.2, 7.3, 7.4, and 7.5 product Facsimile Support for i contains a local privilege escalation vulnerability. A malicious actor could gain access to a command line with elevated privileges allowing root access to the host operating system. IBM X-Force ID: 262173.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40312 β€Ό

Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload.Γ‚ The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanksΓ‚ Jordi Miralles Comins for reporting this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29468 β€Ό

The Texas Instruments (TI) WiLink WL18xx MCP driver does not limit the number of information elements (IEs) of type XCC_EXT_1_IE_ID or XCC_EXT_2_IE_ID that can be parsed in a management frame. Using a specially crafted frame, a buffer overflow can be triggered that can potentially lead to remote code execution. This affects WILINK8-WIFI-MCP8 version 8.5_SP3 and earlier.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28481 β€Ό

An issue was discovered in Tigergraph Enterprise 3.7.0. There is unsecured write access to SSH authorized keys file. Any code running as the tigergraph user is able to add their SSH public key into the authorised keys file. This allows an attacker to obtain password-less SSH key access by using their own SSH key.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32748 β€Ό

The Linux DVS server component of Mitel MiVoice Connect through 19.3 SP2 (22.24.1500.0) could allow an unauthenticated attacker with internal network access to execute arbitrary scripts due to improper access control.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39292 β€Ό

A SQL Injection vulnerability has been identified in the MiVoice Office 400 SMB Controller through 1.2.5.23 which could allow a malicious actor to access sensitive information and execute arbitrary database and management operations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40360 β€Ό

QEMU through 8.0.4 accesses a NULL pointer in nvme_directive_receive in hw/nvme/ctrl.c because there is no check for whether an endurance group is configured before checking whether Flexible Data Placement is enabled.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-28483 β€Ό

An issue was discovered in Tigergraph Enterprise 3.7.0. The GSQL query language provides users with the ability to write data to files on a remote TigerGraph server. The locations that a query is allowed to write to are configurable via the GSQL.FileOutputPolicy configuration setting. GSQL queries that contain UDFs can bypass this configuration setting and, as a consequence, can write to any file location to which the administrative user has access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0872 β€Ό

The Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege.Γ‚ The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.OpenNMS thanksΓ‚ Erik Wynter for reporting this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40311 β€Ό

Multiple stored XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that allow an attacker to store on database and then load on JSPs or Angular templates. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanksΓ‚ Jordi Miralles Comins for reporting this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39908 β€Ό

The PKCS11 module of the YubiHSM 2 SDK through 2023.01 does not properly validate the length of specific read operations on object metadata. This may lead to disclosure of uninitialized and previously used memory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28482 β€Ό

An issue was discovered in Tigergraph Enterprise 3.7.0. A single TigerGraph instance can host multiple graphs that are accessed by multiple different users. The TigerGraph platform does not protect the confidentiality of any data uploaded to the remote server. In this scenario, any user that has permissions to upload data can browse data uploaded by any other user (irrespective of their permissions).

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-38741 β€Ό

IBM TXSeries for Multiplatforms 8.1, 8.2, and 9.1 is vulnerable to a denial of service, caused by improper enforcement of the timeout on individual read operations. By conducting a slowloris-type attacks, a remote attacker could exploit this vulnerability to cause a denial of service. IBM X-Force ID: 262905.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28480 β€Ό

An issue was discovered in Tigergraph Enterprise 3.7.0. The TigerGraph platform allows users to define new User Defined Functions (UDFs) from C/C++ code. To support this functionality TigerGraph allows users to upload custom C/C++ code which is then compiled and installed into the platform. An attacker who has filesystem access on a remote TigerGraph system can alter the behavior of the database against the will of the database administrator; thus effectively bypassing the built in RBAC controls.

πŸ“– Read

via "National Vulnerability Database".
🦿 5 Tips for Securing Data When Using a Personal Mac for Work 🦿

Discover strategies for securing data on your personal Mac for work tasks. Learn how to protect your device against potential threats.

πŸ“– Read

via "Tech Republic".
β™ŸοΈ Diligere, Equity-Invest Are New Firms of U.K. Con Man β™ŸοΈ

John Clifton Davies, a convicted fraudster estimated to have bilked dozens of technology startups out of more than $30 million through phony investment schemes, has a brand new pair of scam companies that are busy dashing startup dreams: A fake investment firm called Equity-Invest[.]ch, and Diligere[.]co.uk, a scam due diligence company that Equity-Invest insists all investment partners use.A native of the United Kingdom, Mr. Davies absconded from justice before being convicted on multiple counts of fraud in 2015. Prior to his conviction, Davies served 16 months in jail before being cleared on suspicion of murdering his third wife on their honeymoon in India.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Phishing Operators Make Ready Use of Abandoned Websites for Bait πŸ•΄

Abandoned sites β€” like Wordpress β€” are easy to break into, offer a legitimate looking cover, and can remain active for longer than average.

πŸ“– Read

via "Dark Reading".