πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-8568 β€Ό

Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that contain other Kubernetes Secrets.

πŸ“– Read

via "National Vulnerability Database".
❌ Einstein Healthcare Network Announces August Breach ❌

Einstein is in violation of the the HHS 60-day breach notification rule, but unlikely to face penalty.

πŸ“– Read

via "Threat Post".
❌ SQL Server Malware Tied to Iranian Software Firm, Researchers Allege ❌

Researchers have traced the origins of a campaign - infecting SQL servers to mine cryptocurrency - back to an Iranian software firm.

πŸ“– Read

via "Threat Post".
🦿 2020 sees huge increase in records exposed in data breaches 🦿

The number of breaches may have fallen, but the number of exposed records hit a high not seen since 2005, says Risk Based Security.

πŸ“– Read

via "Tech Republic".
πŸ” EDPB Issues Draft Guidelines for Data Breach Notifications πŸ”

The guidelines are supposed to help data controllers when it comes to deciding how to handle data breaches and what factors to consider during risk assessment.

πŸ“– Read

via "Digital Guardian".
πŸ•΄ Attackers Leave Stolen Credentials Searchable on Google πŸ•΄

Operators behind a global phishing campaign inadvertently left thousands of stolen credentials accessible via Google Search.

πŸ“– Read

via "Dark Reading".
🦿 Google: How and when to change your password 🦿

If you've ever been tempted to change your Google account password, but weren't sure how, don't let that confusion stop you. Jack Wallen walks you through the process.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Breach Data Shows Attackers Switched Gears in 2020 πŸ•΄

Attackers focused more on ransomware, while the consolidation of data into large databases led to fewer reported breaches but more records leaked.

πŸ“– Read

via "Dark Reading".
πŸ•΄ DreamBus, FreakOut Botnets Pose New Threat to Linux Systems πŸ•΄

Researchers from Zscaler and Check Point describe botnets as designed for DDoS attacks, cryptocurrency mining, and other malicious purposes.

πŸ“– Read

via "Dark Reading".
🦿 These Microsoft tools help you reduce, remove or lock down admin access to improve security 🦿

The SolarWinds compromise means you can no longer put off privileged account management.

πŸ“– Read

via "Tech Republic".
🦿 Bosses are using monitoring software to keep tabs on working at home. Privacy rules aren't keeping up 🦿

Worker's union Prospect warned that the UK was at risk of 'sleepwalking into a world of surveillance' as more businesses turn to digital tools to keep tabs on remote workers.

πŸ“– Read

via "Tech Republic".
❌ Threat Actors Can Exploit Windows RDP Servers to Amplify DDoS Attacks ❌

Netscout researchers identify more than 14,000 existing servers that can be abused by β€˜the general attack population’ to flood organizations’ networks with traffic.

πŸ“– Read

via "Threat Post".
⚠ US administration adds β€œsubliminal” ad to White House website ⚠

Hiding digital "secrets" where they're supposed to be found is good fun. Just don't hide actual secrets and hope no one will notice!

πŸ“– Read

via "Naked Security".
🦿 The new Microsoft Edge browser will warn you if your password has been leaked online 🦿

The new Edge 88 browser includes tough new security features, including a password generator and a tool for monitoring whether your login details have been exposed to the dark web.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Why North Korea Excels in Cybercrime πŸ•΄

North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it.

πŸ“– Read

via "Dark Reading".
πŸ” Friday Five 1/22 πŸ”

Copycats, searchable phishing campaigns, and cybersecurity policy in the new administration - catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
β€Ό CVE-2020-28488 β€Ό

This affects all versions of package jquery-ui; all versions of package org.fujion.webjars:jquery-ui. When the "dialog" is injected into an HTML tag more than once, the browser and the application may crash.

πŸ“– Read

via "National Vulnerability Database".
❌ Ransomware Attackers Publish 4K Private Scottish Gov Agency Files ❌

Up to 4,000 stolen files have been released by hackers who launched a ransomware attack against the Scottish Environmental Protection Agency on Christmas Eve.

πŸ“– Read

via "Threat Post".
❌ Discord-Stealing Malware Invades npm Packages ❌

The CursedGrabber malware has infiltrated the open-source software code repository.

πŸ“– Read

via "Threat Post".
❌ ADT Tech Hacks Home-Security Cameras to Spy on Women ❌

A former ADT employee pleads guilty of accessing customers’ cameras so he could spy on them.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-21259 β€Ό

HedgeDoc is open source software which lets you create real-time collaborative markdown notes. In HedgeDoc before version 1.7.2, an attacker can inject arbitrary JavaScript into a HedgeDoc note, which is executed when the note is viewed in slide mode. Depending on the configuration of the instance, the attacker may not need authentication to create or edit notes. The problem is patched in HedgeDoc 1.7.2. ### Workarounds Disallow loading JavaScript from 3rd party sites using the `Content-Security-Policy` header. Note that this will break some embedded content. ### References This issue was discovered by @TobiasHoll and reported to hackmdio/codimd: https://github.com/hackmdio/codimd/issues/1648 ### For more information If you have any questions or comments about this advisory: * Open an topic on our community forum * Join our matrix room

πŸ“– Read

via "National Vulnerability Database".