πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-27201 β€Ό

Endian Firewall Community (aka EFW) 3.3.2 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in a backup comment.

πŸ“– Read

via "National Vulnerability Database".
⚠ How one man silently infiltrated dozens of high-tech networks ⚠

Ever counted how many external source code dependencies your fancy new software product has? Be prepared for a surprise!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-27234 β€Ό

An issue was discovered in Mutare Voice (EVM) 3.x before 3.3.8. The web application suffers from SQL injection on Adminlog.asp, Archivemsgs.asp, Deletelog.asp, Eventlog.asp, and Evmlog.asp.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27233 β€Ό

An issue was discovered in Mutare Voice (EVM) 3.x before 3.3.8. On the admin portal of the web application, password information for external systems is visible in cleartext. The Settings.asp page is affected by this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27235 β€Ό

An issue was discovered in Mutare Voice (EVM) 3.x before 3.3.8. On the admin portal of the web application, there is a functionality at diagzip.asp that allows anyone to export tables of a database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27229 β€Ό

Mumble before 1.3.4 allows remote code execution if a victim navigates to a crafted URL on a server list and clicks on the Open Webpage text.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27236 β€Ό

An issue was discovered in Mutare Voice (EVM) 3.x before 3.3.8. getfile.asp allows Unauthenticated Local File Inclusion, which can be leveraged to achieve Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27231 β€Ό

Hestia Control Panel through 1.3.3, in a shared-hosting environment, sometimes allows remote authenticated users to create a subdomain for a different customer's domain name, leading to spoofing of services or email messages.

πŸ“– Read

via "National Vulnerability Database".
🦿 Top 5 security risks to connected cars, according to Trend Micro 🦿

Analysts from Trend Micro rate DDoS attacks and electronic jamming as some of the highest cybersecurity risks for connected cars.

πŸ“– Read

via "Tech Republic".
🦿 State of malware: 3 key findings in the latest Malwarebytes report 🦿

Spyware activity spiked in 2020, and the malware-as-a-service business model got more sophisticated.

πŸ“– Read

via "Tech Republic".
⚠ Romance scams at all-time high: here’s what you need to know ⚠

It's heartbreaking to get sucked into a romance scam, or to watch a friend or family member getting sucked in. Here's what to do...

πŸ“– Read

via "Naked Security".
πŸ•΄ Black History Month 2021: Time to Talk Diversity and Cybersecurity πŸ•΄

In an industry that consistently needs new ideas, it's essential to have individuals who think, speak, and act in diverse ways.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-24841 β€Ό

PNPSCADA 2.200816204020 allows SQL injection via parameter 'interf' in /browse.jsp. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Fighting Fileless Malware, Part 3: Mitigations πŸ•΄

Attackers can dodge the countermeasures you employ against fileless malware. So how do you mitigate the damage?

πŸ“– Read

via "Dark Reading".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.5.6 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

πŸ“– Read

via "Packet Storm Security".
πŸ›  Recon Informer 1.3 πŸ› 

Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Palo Alto Networks Plans to Acquire Cloud Security Firm πŸ•΄

Most of Fortune 100 firms have used Bridgecrew's service in their application development processes.

πŸ“– Read

via "Dark Reading".
❌ Misconfigured Baby Monitors Allow Unauthorized Viewing ❌

Hundreds of thousands of individuals are potentially affected by this vulnerability.

πŸ“– Read

via "Threat Post".
❌ Microsoft Pulls Bad Windows Update After Patch Tuesday Headaches ❌

Microsoft released a new servicing stack update (KB5001078) after an older one caused problems for Windows users installing Patch Tuesday security updates.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-25340 β€Ό

An issue was discovered in NFStream 5.2.0. Because some allocated modules are not correctly freed, if the nfstream object is directly destroyed without being used after it is created, it will cause a memory leak that may result in a local denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35566 β€Ό

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. An attacker can read arbitrary JSON files via Local File Inclusion.

πŸ“– Read

via "National Vulnerability Database".