🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
ATENTION New - CVE-2012-3341

IBM InfoSphere Guardium 7.0, 8.0, 8.01, and 8.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. IBM X-Force ID: 78294.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3340

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 is vulnerable to XML external entity injection, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 78291.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3338

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 could allow a remote attacker to bypass security restrictions, caused by improper restrictions on the create new user account functionality. An attacker could exploit this vulnerability to create unprivileged user accounts. IBM X-Force ID: 78286.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3337

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to download arbitrary files on the system. IBM X-Force ID: 78284.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2012-3336

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to multiple scripts, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 78282.

📖 Read

via "National Vulnerability Database".
🕴 New APT Pioneer Kitten Linked to Iranian Government 🕴

The group's targets have primarily been North American and Israeli entities, with a focus on technology, government, defense, and healthcare.

📖 Read

via "Dark Reading: ".
🕴 Apple Signs Shlayer, Legitimizes Malware 🕴

Shlayer, a common macOS Trojan, received Apple's notary certification and place in the App Store -- twice.

📖 Read

via "Dark Reading: ".
Magento Sites Vulnerable to RCE Stemming From Magmi Plugin Flaws

Two flaws - one of them yet to be fixed - are afflicting a third-party plugin used by Magento e-commerce websites.

📖 Read

via "Threatpost".
🕴 Anti-Phishing Startup Pixm Aims to Hook Browser-Based Threats 🕴

Pixm visually analyzes phishing websites from a human perspective to detect malicious pages people might otherwise miss.

📖 Read

via "Dark Reading: ".
🕴 New Threat Activity by Lazarus Group Spells Trouble For Orgs 🕴

The North Korea-backed group has launched several campaigns to raise revenue for cash-strapped nation's missile program, security experts say.

📖 Read

via "Dark Reading: ".
Chinese APT Debuts Sepulcher Malware in Spear-Phishing Attacks

The RAT has been distributed in various campaigns over the past six months, targeting both European officials and Tibetan dissidents.

📖 Read

via "Threatpost".
Cisco Warns of Active Exploitation of Flaw in Carrier-Grade Routers

Multiple flaws in system software that causes errors in packet handling could allow an attacker to consume memory and crash devices.

📖 Read

via "Threatpost".
Live Webinar: XDR and Beyond

Next week, Senior Analyst Dave Gruber of ESG will join cybersecurity company Cynet for a webinar to help companies better understand the promise and realities of emerging XDR technologies

📖 Read

via "Threatpost".
Phishing scam uses Sharepoint and One Note to go after passwords

Not all phishing links appear right in the email itself...

📖 Read

via "Naked Security".
🕴 Hypothesis: Cyber Attackers Are After Your Scientific Research 🕴

From COVID-19 treatment to academic studies, keeping research secure is more important than ever. The ResearchSOC at Indiana University intends to help.

📖 Read

via "Dark Reading: ".
🕴 Why Kubernetes Clusters Are Intrinsically Insecure (& What to Do About Them) 🕴

By following best practices and prioritizing critical issues, you can reduce the chances of a security breach and constrain the blast radius of an attempted attack. Here's how.

📖 Read

via "Dark Reading: ".
🔐 33% of companies expose unsafe network services to the internet 🔐

The findings of a new report validate the correlation between poor network hygiene and the prevalence of wider security issues in the digital supply chain.

📖 Read

via "Security on TechRepublic".
🔐 How insider threats pose risks and challenges to any organization 🔐

Insider threats can be difficult to combat and manage due to budgetary limits, lack of staff, and insufficient tools, says Bitglass.

📖 Read

via "Security on TechRepublic".
🕴 DHS Partners with Industry to Offer State, Local Gov'ts Cybersecurity Aid 🕴

The US Department of Homeland Security teams up with Akamai and the Center for Internet Security to provide state and local governments with cybersecurity through DNS for free.

📖 Read

via "Dark Reading: ".
🕴 5 Tips for Triaging Risk from Exposed Credentials 🕴

Not all exposed usernames and passwords present a threat. Here's how to quickly identify the ones that do.

📖 Read

via "Dark Reading: ".
🔐 How to enable end-to-end encryption for the Nextcloud app 🔐

Learn how you can enable the new Nextcloud end-to-end encryption.

📖 Read

via "Security on TechRepublic".