๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿฆฟ New Cyberattack From Winter Vivern Exploits a Zero-Day Vulnerability in Roundcube Webmail ๐Ÿฆฟ

After reading the technical details about this zero-day that targeted governmental entities and a think tank in Europe and learning about the Winter Vivern threat actor, get tips on mitigating this cybersecurity attack.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿ•ด Understand the True Cost of a UEM Before Making the Switch ๐Ÿ•ด

When investing in a unified endpoint management solution, prioritize the needs of your network and users ahead of brand names. This Tech Tip focuses on questions to ask.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿฆฟ TunnelBear VPN Review 2023: Pricing, Ease of Use & Security ๐Ÿฆฟ

Read our in-depth analysis of TunnelBear VPN, covering its pricing, ease of use, security features, and more. Find out if this is the right VPN for you.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿฆฟ 5 Best Chrome VPN Extensions for 2023: Complete Buyerโ€™s Guide ๐Ÿฆฟ

Looking for the best VPNs for Chrome extension to enhance your online security and privacy? Dive into our list of top rated VPNs and find your best fit.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿฆฟ The Top 6 Enterprise VPN Solutions to Use in 2023 ๐Ÿฆฟ

Enterprise VPNs are critical for connecting remote workers to company resources via reliable and secure links to foster communication and productivity. Read about six viable choices for businesses.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿฆฟ Apple Vulnerability Can Expose iOS and macOS History and Passwords ๐Ÿฆฟ

This Safari vulnerability has not been exploited in the wild. Apple offers a mitigation, but the fix needs to be enabled manually.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿ•ด Octo Tempest Group Threatens Physical Violence as Social Engineering Tactic ๐Ÿ•ด

The financially motivated English-speaking threat actors use advanced social engineering techniques, SIM swapping, and even threats of violence to breach targets.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2023-5826 โ€ผ

A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/list_onlineuser.php. The manipulation of the argument SessionId leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243716. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-5827 โ€ผ

A vulnerability was found in Shanghai CTI Navigation CTI Monitoring and Early Warning System 2.2. It has been classified as critical. This affects an unknown part of the file /Web/SysManage/UserEdit.aspx. The manipulation of the argument ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-243717 was assigned to this vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-46246 โ€ผ

Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-27854 โ€ผ

An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow. ร‚ The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. ร‚ The user would need to open a malicious file provided to them by the attacker for the code to execute.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-46289 โ€ผ

Rockwell Automation FactoryTalk View Site Edition insufficiently validates user input, which could potentially allow threat actors to send malicious data bringing the product offline. If exploited, the product would become unavailable and require a restart to recover resulting in a denial-of-service condition.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-34886 โ€ผ

A remote code execution vulnerability was found in the firmware used in some Lenovo printers, which can be caused by a remote user pushing an illegal string to the server-side interface via a script, resulting in a stack overflow.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-34887 โ€ผ

Standard users can directly operate and set printer configuration information , such as IP, in some Lenovo Printers without having to authenticate with the administrator password.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-3429 โ€ผ

A denial-of-service vulnerability was found in the firmware used in Lenovo printers, where users send illegal or malformed strings to an open port, triggering a denial of service that causes a display error and prevents the printer from functioning properly.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-4967 โ€ผ

Denial of Service in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-27858 โ€ผ

Rockwell Automation Arena Simulation contains an arbitrary code execution vulnerability that could potentially allow a malicious user to commit unauthorized code to the software by using anร‚ uninitialized pointer in the application. ร‚ The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. ร‚ The user would need to open a malicious file provided to them by the attacker for the code to execute.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-46290 โ€ผ

Due to inadequate code logic, a previously unauthenticated threat actor could potentially obtain a local Windows OS user token through the FactoryTalkร‚ยฎ Services Platform web service and then use the token to log in into FactoryTalkร‚ยฎ Services Platform . This vulnerability can only be exploited if the authorized user did not previously log in into the FactoryTalkร‚ยฎ Services Platform web service.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Safari Side-Channel Attack Enables Browser Theft ๐Ÿ•ด

The "iLeakage" attack affects all recent iPhone, iPad, and MacBook models, allowing attackers to peruse your Gmail inbox, steal your Instagram password, or scrutinize your YouTube history.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ‘1
โ€ผ CVE-2023-40139 โ€ผ

In FillUi of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ‘1
โ€ผ CVE-2023-40136 โ€ผ

In setHeader of DialogFillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

๐Ÿ“– Read

via "National Vulnerability Database".