πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2019-25001 β€Ό

An issue was discovered in the serde_cbor crate before 0.10.2 for Rust. The CBOR deserializer can cause stack consumption via nested semantic tags.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35886 β€Ό

An issue was discovered in the arr crate through 2020-08-25 for Rust. An attacker can smuggle non-Sync/Send types across a thread boundary to cause a data race.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-25007 β€Ό

An issue was discovered in the streebog crate before 0.8.0 for Rust. The Streebog hash function can cause a panic.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-25002 β€Ό

An issue was discovered in the sodiumoxide crate before 0.2.5 for Rust. generichash::Digest::eq compares itself to itself and thus has degenerate security properties.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35851 β€Ό

HGiga MailSherlock does not validate specific parameters properly. Attackers can use the vulnerability to launch Command inject attacks remotely and execute arbitrary commands of the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35862 β€Ό

An issue was discovered in the bitvec crate before 0.17.4 for Rust. BitVec to BitBox conversion leads to a use-after-free or double free.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35922 β€Ό

An issue was discovered in the mio crate before 0.7.6 for Rust. It has false expectations about the std::net::SocketAddr memory representation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35896 β€Ό

An issue was discovered in the ws crate through 2020-09-25 for Rust. The outgoing buffer is not properly limited, leading to a remote memory-consumption attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35897 β€Ό

An issue was discovered in the atom crate before 0.3.6 for Rust. An unsafe Send implementation allows a cross-thread data race.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35876 β€Ό

An issue was discovered in the rio crate through 2020-05-11 for Rust. A struct can be leaked, allowing attackers to obtain sensitive information, cause a use-after-free, or cause a data race.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35880 β€Ό

An issue was discovered in the bigint crate through 2020-05-07 for Rust. It allows a soundness violation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35882 β€Ό

An issue was discovered in the rocket crate before 0.4.5 for Rust. LocalRequest::clone creates more than one mutable references to the same object, possibly causing a data race.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 20 for 2020: The Edge's Top Articles of the Year πŸ•΄

Variety is the spice of life, and it's also the perfect analogy for the article topics that resonated most with Edge readers this past year.

πŸ“– Read

via "Dark Reading".
⚠ Get back into the cybersecurity groove for 2021 ⚠

5 articles that help you become an expert, without needing you to be an expert to read them in the first place

πŸ“– Read

via "Naked Security".
πŸ•΄ The Coolest Hacks of 2020 πŸ•΄

Despite a pandemic and possibly the worst cyberattack campaign ever waged against the US, the year still had some bright spots when it came to "good" and creative hacks.

πŸ“– Read

via "Dark Reading".
❌ What’s Next for Ransomware in 2021? ❌

Ransomware response demands a whole-of-business plan before the next attack, according to our roundtable of experts.

πŸ“– Read

via "Threat Post".
πŸ•΄ How to Build Cyber Resilience in a Dangerous Atmosphere πŸ•΄

Our polarized climate and COVID-19 are putting the nation's cybersecurity in imminent danger, and it's past time to act.

πŸ“– Read

via "Dark Reading".
πŸ” 50 Threat Intelligence Tools for Valuable Threat Insights πŸ”

Threat analysis tools with updated intelligence feeds have become an essential part of defenders' toolkits. In this blog, we look at 50 threat intelligence tools that can help teams better protect their business.

πŸ“– Read

via "Digital Guardian".
⚠ S3 Ep13: A chat with hacker Keren Elazari [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Microsoft Reveals That Russian Attackers Accessed Some of Its Source Code πŸ•΄

Malicious SolarWinds Orion backdoor installed in Microsoft's network led to the attackers viewing some of its source code.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2019-25011 β€Ό

NetBox through 2.6.2 allows an Authenticated User to conduct an XSS attack against an admin via a GFM-rendered field, as demonstrated by /dcim/sites/add/ comments.

πŸ“– Read

via "National Vulnerability Database".