🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🔏 Phishing, BEC Scams Netting $80,000 On Average in 2020 🔏

A recap of recent phishing activity trends found a decrease in detected phishing sites but a big increase in Business Email Compromise attack losses, around $80 million per attack.

📖 Read

via "Subscriber Blog RSS Feed ".
🔐 Ransomware attacks continue to dominate the threat landscape 🔐

Cybercriminals are increasingly exploiting the Cobalt Strike testing toolkit to carry out ransomware campaigns, says Cisco Talos Incident Response.

📖 Read

via "Security on TechRepublic".
🛠 Sifter 10 🛠

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
🛠 SQLMAP - Automatic SQL Injection Tool 1.4.9 🛠

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
ATENTION New - CVE-2012-3341

IBM InfoSphere Guardium 7.0, 8.0, 8.01, and 8.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. IBM X-Force ID: 78294.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3340

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 is vulnerable to XML external entity injection, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 78291.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3338

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 could allow a remote attacker to bypass security restrictions, caused by improper restrictions on the create new user account functionality. An attacker could exploit this vulnerability to create unprivileged user accounts. IBM X-Force ID: 78286.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3337

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to download arbitrary files on the system. IBM X-Force ID: 78284.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3336

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to multiple scripts, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 78282.

📖 Read

via "National Vulnerability Database".
🕴 New APT Pioneer Kitten Linked to Iranian Government 🕴

The group's targets have primarily been North American and Israeli entities, with a focus on technology, government, defense, and healthcare.

📖 Read

via "Dark Reading: ".
🕴 Apple Signs Shlayer, Legitimizes Malware 🕴

Shlayer, a common macOS Trojan, received Apple's notary certification and place in the App Store -- twice.

📖 Read

via "Dark Reading: ".
Magento Sites Vulnerable to RCE Stemming From Magmi Plugin Flaws

Two flaws - one of them yet to be fixed - are afflicting a third-party plugin used by Magento e-commerce websites.

📖 Read

via "Threatpost".
🕴 Anti-Phishing Startup Pixm Aims to Hook Browser-Based Threats 🕴

Pixm visually analyzes phishing websites from a human perspective to detect malicious pages people might otherwise miss.

📖 Read

via "Dark Reading: ".
🕴 New Threat Activity by Lazarus Group Spells Trouble For Orgs 🕴

The North Korea-backed group has launched several campaigns to raise revenue for cash-strapped nation's missile program, security experts say.

📖 Read

via "Dark Reading: ".
Chinese APT Debuts Sepulcher Malware in Spear-Phishing Attacks

The RAT has been distributed in various campaigns over the past six months, targeting both European officials and Tibetan dissidents.

📖 Read

via "Threatpost".
Cisco Warns of Active Exploitation of Flaw in Carrier-Grade Routers

Multiple flaws in system software that causes errors in packet handling could allow an attacker to consume memory and crash devices.

📖 Read

via "Threatpost".
Live Webinar: XDR and Beyond

Next week, Senior Analyst Dave Gruber of ESG will join cybersecurity company Cynet for a webinar to help companies better understand the promise and realities of emerging XDR technologies

📖 Read

via "Threatpost".
Phishing scam uses Sharepoint and One Note to go after passwords

Not all phishing links appear right in the email itself...

📖 Read

via "Naked Security".
🕴 Hypothesis: Cyber Attackers Are After Your Scientific Research 🕴

From COVID-19 treatment to academic studies, keeping research secure is more important than ever. The ResearchSOC at Indiana University intends to help.

📖 Read

via "Dark Reading: ".
🕴 Why Kubernetes Clusters Are Intrinsically Insecure (& What to Do About Them) 🕴

By following best practices and prioritizing critical issues, you can reduce the chances of a security breach and constrain the blast radius of an attempted attack. Here's how.

📖 Read

via "Dark Reading: ".
🔐 33% of companies expose unsafe network services to the internet 🔐

The findings of a new report validate the correlation between poor network hygiene and the prevalence of wider security issues in the digital supply chain.

📖 Read

via "Security on TechRepublic".