🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Adversaries Ride RocketMQ Bug to DreamBus Bot Resurgence 🕴

Last seen in 2021, DreamBus Monero crypto bot is back and finding new life on vulnerable RocketMQ servers.

📖 Read

via "Dark Reading".
🕴 A Brief History of ICS-Tailored Attacks 🕴

It's on the cyber defenders to learn from the past and make industrial control system networks hostile to attackers.

📖 Read

via "Dark Reading".
CVE-2023-33833

IBM Security Verify Information Queue 10.0.4 and 10.0.5 stores sensitive information in plain clear text which can be read by a local user. IBM X-Force ID: 256013.

📖 Read

via "National Vulnerability Database".
🕴 Cyberattackers Swarm OpenFire Cloud Servers With Takeover Barrage 🕴

The Kinsing threat group has launched more than 1,000 cyberattacks in less than two months, exploiting a security vulnerability in the internal corporate messaging app in order to upload the malware and a cryptominer.

📖 Read

via "Dark Reading".
📢 National Grid exploring cyber honeypots in bid to mitigate rising threats 📢

Honeypots are by no means a new technique, but they are helping firms identify and mitigate cyber threats

📖 Read

via "ITPro".
🛠 TOR Virtual Network Tunneling Tool 0.4.8.5 🛠

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

📖 Read

via "Packet Storm Security".
CVE-2023-41642

Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user's browser via a crafted payload injected into the VIEWSTATE parameter.

📖 Read

via "National Vulnerability Database".
CVE-2023-33834

IBM Security Verify Information Queue 10.0.4 and 10.0.5 could allow a remote attacker to obtain sensitive information that could aid in further attacks against the system. IBM X-force ID: 256014.

📖 Read

via "National Vulnerability Database".
CVE-2022-45451

Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984.

📖 Read

via "National Vulnerability Database".
CVE-2023-41742

Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.

📖 Read

via "National Vulnerability Database".
CVE-2023-41638

An arbitrary file upload vulnerability in the Gestione Documentale module of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted file.

📖 Read

via "National Vulnerability Database".
CVE-2023-41637

An arbitrary file upload vulnerability in the Carica immagine function of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted HTML file.

📖 Read

via "National Vulnerability Database".
CVE-2022-46868

Local privilege escalation during recovery due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173.

📖 Read

via "National Vulnerability Database".
CVE-2023-28801

An Improper Verification of Cryptographic Signature in the SAML authentication of the Zscaler Admin UI allows a Privilege Escalation.This issue affects Admin UI: from 6.2 before 6.2r.

📖 Read

via "National Vulnerability Database".
CVE-2023-33835

IBM Security Verify Information Queue 10.0.4 and 10.0.5 could allow a remote attacker to obtain sensitive information that could aid in further attacks against the system. IBM X-Force ID: 256015.

📖 Read

via "National Vulnerability Database".
CVE-2023-41636

A SQL injection vulnerability in the Data Richiesta dal parameter of GruppoSCAI RealGimm v1.1.37p38 allows attackers to access the database and execute arbitrary commands via a crafted SQL query.

📖 Read

via "National Vulnerability Database".
CVE-2023-41640

An improper error handling vulnerability in the component ErroreNonGestito.aspx of GruppoSCAI RealGimm 1.1.37p38 allows attackers to obtain sensitive technical information via a crafted SQL query.

📖 Read

via "National Vulnerability Database".
CVE-2023-41635

A XML External Entity (XXE) vulnerability in the VerifichePeriodiche.aspx component of GruppoSCAI RealGimm v1.1.37p38 allows attackers to read any file in the filesystem via supplying a crafted XML file.

📖 Read

via "National Vulnerability Database".
1
🦿 10 best antivirus software for businesses in 2023 🦿

Antivirus software protects your data against cybercriminals, ransomware and malware. Compare the best software now.

📖 Read

via "Tech Republic".
CVE-2023-31171

An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.

📖 Read

via "National Vulnerability Database".
CVE-2023-4683

NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.

📖 Read

via "National Vulnerability Database".