π’ NIST aims to quantum-proof encryption with new algorithms π’
π Read
via "ITPro".
Three algorithms are now in draft and more are on the way to bolster enterprise defenses π Read
via "ITPro".
ITPro
NIST aims to quantum-proof encryption with new algorithms
Three algorithms are now in draft and more are on the way to bolster enterprise defenses
π’ Encouraging a security-first mindset π’
π Read
via "ITPro".
Security has to be seen from a business perspective as well as a technical one π Read
via "ITPro".
ITPro
Encouraging a security-first mindset
Security has to be seen from a business perspective as well as a technical one
βοΈ Kroll Employee SIM-Swapped for Crypto Investor Data βοΈ
π Read
via "Krebs on Security".
Security consulting giant Kroll disclosed today that a SIM-swapping attack against one of its employees led to the theft of user information for multiple cryptocurrency platforms that are relying on Kroll services in their ongoing bankruptcy proceedings. And there are indications that fraudsters may already be exploiting the stolen data in phishing attacks.Cryptocurrency lender BlockFi and the now-collapsed crypto trading platform FTX each disclosed data breaches this week thanks to a recent SIM-swapping attack targeting an employee of Kroll -- the company handling both firms' bankruptcy restructuring.π Read
via "Krebs on Security".
Krebs on Security
Kroll Employee SIM-Swapped for Crypto Investor Data
Security consulting giant Kroll disclosed today that a SIM-swapping attack against one of its employees led to the theft of user information for multiple cryptocurrency platforms that are relying on Kroll services in their ongoing bankruptcy proceedings.β¦
π΄ 'Whiffy Recon' Malware Transmits Device Location Every 60 Seconds π΄
π Read
via "Dark Reading".
Deployed by the infamous SmokeLoader botnet, the location-tracking malware could be used for a host of follow-on cyberattacks or even physical targeting.π Read
via "Dark Reading".
Dark Reading
'Whiffy Recon' Malware Transmits Device Location Every 60 Seconds
Deployed by the infamous SmokeLoader botnet, the location-tracking malware could be used for a host of follow-on cyberattacks or even physical targeting.
βΌ CVE-2023-40797 βΌ
π Read
via "National Vulnerability Database".
In Tenda AC23 v16.03.07.45_cn, the sub_4781A4 function does not validate the parameters entered by the user, resulting in a post-authentication stack overflow vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38201 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.π Read
via "National Vulnerability Database".
βΌ CVE-2020-11711 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Stormshield SNS 3.8.0. Authenticated Stored XSS in the admin login panel leads to SSL VPN credential theft. A malicious disclaimer file can be uploaded from the admin panel. The resulting file is rendered on the authentication interface of the admin panel. It is possible to inject malicious HTML content in order to execute JavaScript inside a victim's browser. This results in a stored XSS on the authentication interface of the admin panel. Moreover, an unsecured authentication form is present on the authentication interface of the SSL VPN captive portal. Users are allowed to save their credentials inside the browser. If an administrator saves his credentials through this unsecured form, these credentials could be stolen via the stored XSS on the admin panel without user interaction. Another possible exploitation would be modification of the authentication form of the admin panel into a malicious form.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40796 βΌ
π Read
via "National Vulnerability Database".
Phicomm k2 v22.6.529.216 is vulnerable to command injection.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40798 βΌ
π Read
via "National Vulnerability Database".
In Tenda AC23 v16.03.07.45_cn, the formSetIPv6status and formGetWanParameter functions do not authenticate user input parameters, resulting in a post-authentication stack overflow vulnerability.π Read
via "National Vulnerability Database".
π¦Ώ XLoader Malware Variant Targets MacOS Disguised as OfficeNote App π¦Ώ
π Read
via "Tech Republic".
A new variant of malware called XLoader is targeting macOS users. XLoaderβs execution, functionalities and distribution are detailed.π Read
via "Tech Republic".
TechRepublic
XLoader Malware Variant Targets MacOS Disguised as OfficeNote App
A new variant of malware called XLoader is targeting macOS users. Learn more about how to protect yourself from this malicious software.
π΄ Luna Grabber Malware Targets Roblox Gaming Devs π΄
π Read
via "Dark Reading".
Roblox gaming developers are lured in by a package that claims to create useful scripts to interact with the Roblox website, for example by βpromot(ing) users, shout events, and so on, or to create Discord utiltiies (sic) to manage their community.βπ Read
via "Dark Reading".
Dark Reading
Luna Grabber Malware Targets Roblox Gaming Devs
Roblox gaming developers are lured in by a package that claims to create useful scripts to interact with the Roblox website, for example by βpromot(ing) users, shout events, and so on, or to create Discord utiltiies (sic) to manage their community.β
π΄ China Unleashes Flax Typhoon APT to Live Off the Land, Microsoft Warns π΄
π Read
via "Dark Reading".
The cyber espionage group has created a stealthy, hard-to-mitigate network of persistent access across a range of organizations, but the endgame is unclear.π Read
via "Dark Reading".
Dark Reading
China Unleashes Flax Typhoon APT to Live Off the Land, Microsoft Warns
The cyber-espionage group has created a stealthy, hard-to-mitigate network of persistent access across a range of organizations, but the endgame is unclear.
βΌ CVE-2023-25848 βΌ
π Read
via "National Vulnerability Database".
ArcGIS Enterprise Server versions 11.0 and below have an information disclosure vulnerability where a remote, unauthorized attacker may submit a crafted query that may result in a low severity information disclosure issue. The information disclosed is limited to a single attribute in a database connection string. No business data is disclosed.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2019-13689 βΌ
π Read
via "National Vulnerability Database".
Inappropriate implementation in OS in Google Chrome on ChromeOS prior to 75.0.3770.80 allowed a remote attacker to perform arbitrary read/write via a malicious file. (Chromium security severity: Critical)π Read
via "National Vulnerability Database".
βΌ CVE-2019-13690 βΌ
π Read
via "National Vulnerability Database".
Inappropriate implementation in OS in Google Chrome on ChromeOS prior to 75.0.3770.80 allowed a remote attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: High)π Read
via "National Vulnerability Database".
βΌ CVE-2023-39600 βΌ
π Read
via "National Vulnerability Database".
IceWarp 11.4.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the color parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24621 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40579 βΌ
π Read
via "National Vulnerability Database".
OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. The vulnerability affects customers using `ListObjects` with specific models. The affected models contain expressions of type `rel1 from type1`. This issue has been patched in version 1.3.1.π Read
via "National Vulnerability Database".
βΌ CVE-2023-32678 βΌ
π Read
via "National Vulnerability Database".
Zulip is an open-source team collaboration tool with topic-based threading that combines email and chat. Users who used to be subscribed to a private stream and have been removed from it since retain the ability to edit messages/topics, move messages to other streams, and delete messages that they used to have access to, if other relevant organization permissions allow these actions. For example, a user may be able to edit or delete their old messages they posted in such a private stream. An administrator will be able to delete old messages (that they had access to) from the private stream. This issue was fixed in Zulip Server version 7.3.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40164 βΌ
π Read
via "National Vulnerability Database".
Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to global buffer read overflow in `nsCodingStateMachine::NextStater`. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.π Read
via "National Vulnerability Database".