πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Unpatched Windows Zero-Day Exploited in the Wild for Sandbox Escape ❌

Google Project Zero disclosed the bug before a patch becomes available from Microsoft.

πŸ“– Read

via "Threat Post".
πŸ•΄ Fraud Prevention Strategies to Prepare for the Future πŸ•΄

While companies have largely adjusted to the new normal for security management, here are some tips for combatting fraud, post-COVID.

πŸ“– Read

via "Dark Reading".
❌ Scammers Abuse Google Drive to Send Malicious Links ❌

Cybercriminals are sending malicious links to hundreds of thousands of users via Google Drive notifications.

πŸ“– Read

via "Threat Post".
❌ Texas Gold-Dealer Mined for Payment Details in Months-Long Data Breach ❌

JM Bullion fell victim to a payment-card skimmer, which was in place for five months.

πŸ“– Read

via "Threat Post".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.11 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Samhain File Integrity Checker 4.4.3 πŸ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

πŸ“– Read

via "Packet Storm Security".
🦿 It's an urgent plea this Election Eve: Don't click on ransomware disguised as political ads 🦿

Remote work and social media have made it easier for businesses to be impacted by security breaches. Here's why, and how organizations can protect themselves.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2018-19951 β€Ό

If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2018-19955 β€Ό

The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10.

πŸ“– Read

via "National Vulnerability Database".
❌ WordPress Pushes Out Multiple Flawed Security Updates ❌

WordPress bungles critical security 5.5.2 fix and saves face next day with 5.5.3 update.

πŸ“– Read

via "Threat Post".
πŸ” Digital Guardian Provides Customers Protection Following Spread of Ryuk Ransomware πŸ”

We’ve released a free policy pack to help customers, especially those in the healthcare and public health sector, protect against the latest Ryuk ransomware campaign.

πŸ“– Read

via "Digital Guardian".
πŸ•΄ Windows Zero-Day Used with Chrome Flaw in Targeted Attacks πŸ•΄

Google's Project Zero has disclosed a Windows kernel zero-day vulnerability being used with a known Chrome bug in targeted attacks.

πŸ“– Read

via "Dark Reading".
❌ Survey: Cybersecurity Skills Shortage is β€˜Bad,’ But There’s Hope ❌

Automation, strategic process design and an investment in training are the keys to managing the cybersecurity skills gap, according to a recent survey from Trustwave.

πŸ“– Read

via "Threat Post".
❌ $100M Botnet Scheme Lands Cybercriminal 8 Years in Jail ❌

Aleksandr Brovko faces jail time after stealing $100 million worth of personal identifiable information (PII) and financial data over the course of more than 10 years.

πŸ“– Read

via "Threat Post".
πŸ•΄ Russian National Sentenced to 8 Years in Prison for Role in Botnet Operation πŸ•΄

Cybercrime scheme netted more than $100 million.

πŸ“– Read

via "Dark Reading".
🦿 Hackers have only just wet their whistle. Expect more ransomware and data breaches in 2021. 🦿

The COVID-19 pandemic provided a huge opening for bad actors this year, thanks to remote work. Security experts expect more advanced cybersecurity threats in the coming year.

πŸ“– Read

via "Tech Republic".
πŸ•΄ New Tools Make North Korea's Kimsuky Group More Dangerous πŸ•΄

Threat actor actively targeting US organizations in global intelligence-gathering campaign, government says.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26939 β€Ό

In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.1.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27982 β€Ό

IceWarp 11.4.5.0 allows XSS via the language parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7758 β€Ό

This affects all versions of package browserless-chrome. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-9368 β€Ό

The Module Olea Gift On Order module through 5.0.8 for PrestaShop enables an unauthenticated user to read arbitrary files on the server via getfile.php?file=/.. directory traversal.

πŸ“– Read

via "National Vulnerability Database".