Security
Headlines
HeadlinesLatestCVEs

Tag

#intel

Of sharks, surveillance, and spied-on emails: This is Section 702, with Matthew Guariglia

Categories: Podcast This week on Lock and Code, we speak with Matthew Guargilia about the NSA's broad powers to sweep up Americans' emails, DMs, messages, and all manner of digital communications. (Read more...) The post Of sharks, surveillance, and spied-on emails: This is Section 702, with Matthew Guariglia appeared first on Malwarebytes Labs.

Malwarebytes
#mac#apple#google#git#intel#auth
Architecting XDR to Save Money and Your SOC's Sanity

XDR can lower platform costs and improve detection, but it requires committing to a few principles that go against the established way of thinking about SOC.

US Supreme Court Hands Cyberstalkers a First Amendment Victory

Plus: Hackers knock out Russian military satellite communications, a spyware maker gets breached, and the SEC targets a victim company's CISO.

CVE-2021-4402: Multiple Roles <= 1.3.1- Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Multiple Roles plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.1. This is due to missing or incorrect nonce validation on the mu_add_roles_in_signup_meta() and mu_add_roles_in_signup_meta_recently() functions. This makes it possible for unauthenticated attackers to add additional roles to users via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4398: Amministrazione Trasparente <= 7.1 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Amministrazione Trasparente plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 7.1. This is due to missing or incorrect nonce validation on the at_save_aturl_meta() function. This makes it possible for unauthenticated attackers to update meta data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4403: Remove Schema <= 1.5 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Remove Schema plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the validate() function. This makes it possible for unauthenticated attackers to modify the plugins settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4395: Abandoned Cart Recovery for WooCommerce <= 1.0.4 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Abandoned Cart Recovery for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.4. This is due to missing or incorrect nonce validation on the get_items() and extra_tablenav() functions. This makes it possible for unauthenticated attackers to perform read-only actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2020-36748: Dokan <= 3.0.8 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Dokan plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.0.8. This is due to missing or incorrect nonce validation on the handle_order_export() function. This makes it possible for unauthenticated attackers to trigger an order export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Beware: New 'Rustbucket' Malware Variant Targeting macOS Users

Researchers have pulled back the curtain on an updated version of an Apple macOS malware called Rustbucket that comes with improved capabilities to establish persistence and avoid detection by security software. "This variant of Rustbucket, a malware family that targets macOS systems, adds persistence capabilities not previously observed," Elastic Security Labs researchers said in a report

CVE-2021-4392: eCommerce Product Catalog Plugin for WordPress <= 2.9.43 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The eCommerce Product Catalog Plugin for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.9.43. This is due to missing or incorrect nonce validation on the implecode_save_products_meta() function. This makes it possible for unauthenticated attackers to save product meta data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.