πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Malware Developers Refresh Their Attack Tools πŸ•΄

Cisco analyzes the latest version of the LokiBot malware for stealing credentials, finding that its developers have added more misdirection and anti-analysis features.

πŸ“– Read

via "Dark Reading".
πŸ•΄ When It Comes To Security Tools, More Isn't More πŸ•΄

Organizations that focus on optimizing their tools, cutting down on tool sprawl, and taking a strategic approach to transitioning to the cloud are poised for success.

πŸ“– Read

via "Dark Reading".
πŸ•΄ IoT Vendor Ubiquiti Suffers Data Breach πŸ•΄

Cloud provider hosting "certain" IT systems attacked, company says.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Intel's New vPro Processors Aim to Help Defend Against Ransomware πŸ•΄

The newest Intel Core vPro mobile platform gives PC hardware a direct role in detecting ransomware attacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Russian Hacker Sentenced to 12 Years for Role in Breaches of JP Morgan, Others πŸ•΄

Crimes netted him $19 million overall.

πŸ“– Read

via "Dark Reading".
πŸ•΄ SolarWinds Hires Chris Krebs and Alex Stamos for Breach Recovery πŸ•΄

The former US cybersecurity official and former Facebook security chief will help SolarWinds respond to its recent attack and improve security.

πŸ“– Read

via "Dark Reading".
❌ Ethical Hackers Breach U.N., Access 100,000 Private Records ❌

Researchers informed organization of a flaw that exposed GitHub credentials through the organization’s vulnerability disclosure program.

πŸ“– Read

via "Threat Post".
❌ Europol Reveals Dismantling of β€˜Largest’ Underground Marketplace ❌

Europol announced a wide-ranging investigation that led to the arrest of the alleged DarkMarket operator and the seizure of the marketplace's infrastructure, including more than 20 servers.

πŸ“– Read

via "Threat Post".
πŸ•΄ Security Operations Struggle to Defend Value, Keep Workers πŸ•΄

Companies continue to value security operations centers but the economics are increasingly challenging, with high analyst turnover and questions raised over return on investment.

πŸ“– Read

via "Dark Reading".
πŸ›  Flawfinder 2.0.15 πŸ› 

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

πŸ“– Read

via "Packet Storm Security".
πŸ›  GNU Privacy Guard 2.2.27 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Read

via "Packet Storm Security".
🦿 CES 2021: All of the business tech news you need to know 🦿

Don't miss TechRepublic's CES 2021 coverage, which includes product announcements from Lenovo, Samsung, LG, and Dell about PCs, laptops, software, robots, monitors, and TVs.

πŸ“– Read

via "Tech Republic".
🦿 5 best languages for cloud engineers to learn 🦿

Whether you're trying to break into the role or are already a cloud engineer, these programming languages are a must for maintaining an edge over the competition.

πŸ“– Read

via "Tech Republic".
❌ Adobe Fixes 7 Critical Flaws, Blocks Flash Player Content ❌

Adobe issued patches for seven critical arbitrary-code-execution flaws plaguing Windows and MacOS users.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-21445 β€Ό

SAP Commerce Cloud, versions - 1808, 1811, 1905, 2005, 2011, allows an authenticated attacker to include invalidated data in the HTTP response Content Type header, due to improper input validation, and sent to a Web user. A successful exploitation of this vulnerability may lead to advanced attacks, including cross-site scripting and page hijacking.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35458 β€Ό

An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21457 β€Ό

SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21464 β€Ό

SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21451 β€Ό

SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated SGI file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21459 β€Ό

SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21471 β€Ό

In CLA-Assistant, versions before 2.8.5, due to improper access control an authenticated user could access API endpoints which are not intended to be used by the user. This could impact the integrity of the application.

πŸ“– Read

via "National Vulnerability Database".