Security News > 2022 > March

Critical security vulnerabilities have been uncovered in VoIPmonitor software that, if successfully exploited, could allow unauthenticated attackers to escalate privileges to the administrator level and execute arbitrary commands. "[F]ix critical vulnerabilities - new SQL injects for unauthenticated users allowing gaining admin privileges," the maintainers of VoIPmonitor noted in the change log.

"Buffers used in PJSIP typically have limited sizes, especially the ones allocated in the stack or supplied by the application, however in several places, we do not check if our usage can exceed the sizes," PJSIP's developer Sauw Ming noted in an advisory posted on GitHub last month, a scenario that could result in buffer overflows. CVE-2021-43299 - Stack overflow in PJSUA API when calling pjsua player create().

A Ukrainian researcher continues to deal devastating blows to the Conti ransomware operation, leaking further internal conversations, as well as the source for their ransomware, administrative panels, and more.On Monday, the researcher kept leaking more damaging Conti data, including an additional 148 JSON files containing 107,000 internal messages since June 2020, which is around when the Conti ransomware operation was first launched.

Threat actors are now executing attacks at speeds never witnessed before. Say, a suspicious event is found on Point Product A. The first action that probably needs to be done is a cross-reference with Point Product B and/or Point Product C. Then another step may be needed to cross-verified with a SIEM. This manual process must be done quickly to keep up with the speed of the threat attacks.

Some of the world's most popular communication apps are using an open-source library riddled with newfound security holes. The library, PJSIP - an open-source multimedia communication library - is used by Asterisk.

WhatsApp and BlueJeans are just two of the world's most popular communication apps that are using an open-source library riddled with newfound security holes. On Monday, devops platform provider JFrog Security disclosed five memory-corruption vulnerabilities in PJSIP, which supplies an API that can be used by IP telephony applications such as voice-over-IP phones and conference apps.

Slovakian infosec firm ESET has found a second similar strain in Ukraine. Last week, as the Russian armed forces invaded Ukraine, ESET published details of one wiper - malware that destroys data on whatever computer or device it has infected.

There are plenty of security-related plugins available for WordPress. Because there are so many, which ones should you use? I've put together the top five plugins I always use for every WordPress site.

Microsoft says its new endpoint security solution for small and medium-sized businesses known as Microsoft Defender for Business has hit general availability. It has started rolling out to new and existing Microsoft 365 Business Premium customers worldwide starting today, March 1st. Microsoft Defender for Business helps companies with up to 300 employees defend against cybersecurity threats, including malware, phishing, and ransomware in environments with Windows, macOS, iOS, and Android devices.

Attention, Samsung Galaxy smartphone owners: There's a good chance your device is one of the 100 million that a Tel Aviv University research paper said suffer from a serious encryption flaw. The researchers didn't stumble upon this error, either: They purposely targeted Samsung devices as an attempt to prove that proprietary, and often undocumented, encryption applications endanger everyone using a smartphone.