πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-11281 β€Ό

Allowing RTT frames to be linked with non randomized MAC address by comparing the sequence numbers can lead to information disclosure. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11194 β€Ό

Possible out of bound access in TA while processing a command from NS side due to improper length check of response buffer in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11296 β€Ό

Arithmetic overflow can happen while processing NOA IE due to improper error handling in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
⚠ Naked Security Live – How to calculate important things using a computer ⚠

Here's the latest Naked Security Live talk - watch now!

πŸ“– Read

via "Naked Security".
🦿 Free password manager alternatives to LastPass 🦿

With the free version of LastPass now limiting where you can sync your passwords, here are a few other options.

πŸ“– Read

via "Tech Republic".
🦿 New cloud security analysis finds default configurations and identity management are the biggest concerns 🦿

Accurics analyzed cloud-native configurations over the last 7 months to identify ongoing and new threats.

πŸ“– Read

via "Tech Republic".
🦿 The top 6 enterprise VPNs to use in 2021 🦿

Enterprise VPNs are critical for connecting remote workers to company resources via reliable and secure links to foster communication and productivity. Read about six viable choices for businesses.

πŸ“– Read

via "Tech Republic".
πŸ•΄ What Can Your Connected Car Reveal About You? πŸ•΄

App developers must take responsibility for the security of users' data.

πŸ“– Read

via "Dark Reading".
⚠ Nvidia announces official β€œanti-cryptomining” software drivers ⚠

"It's a DoS, Jim, but not as we know it."

πŸ“– Read

via "Naked Security".
🦿 Mysterious malware infects 30,000 Mac computers 🦿

Known as Silver Sparrow, the malware's intent is still unknown as it has yet to deliver an actual payload, says security firm Red Canary.

πŸ“– Read

via "Tech Republic".
πŸ›  I2P 0.9.49 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Read

via "Packet Storm Security".
πŸ›  OpenDNSSEC 2.1.8 πŸ› 

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Wapiti Web Application Vulnerability Scanner 3.0.4 πŸ› 

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Global Socket 1.4.24 πŸ› 

Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ 8 Ways Ransomware Operators Target Your Network πŸ•΄

Security researchers explore how criminals are expanding their arsenals with new, more subtle, and more effective ransomware attack techniques.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-21224 β€Ό

A Remote Code Execution vulnerability has been found in Inspur ClusterEngine V4.0. A remote attacker can send a malicious login packet to the control server

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27371 β€Ό

The Contact page in Monica 2.19.1 allows stored XSS via the Description field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19762 β€Ό

Automated Logic Corporation (ALC) WebCTRL System 6.5 and prior allows remote attackers to execute any JavaScript code via a XSS payload for the first parameter in a GET request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3120 β€Ό

An arbitrary file upload vulnerability in the YITH WooCommerce Gift Cards Premium plugin before 3.3.1 for WordPress allows remote attackers to achieve remote code execution on the operating system in the security context of the web server. In order to exploit this vulnerability, an attacker must be able to place a valid Gift Card product into the shopping cart. An uploaded file is placed at a predetermined path on the web server with a user-specified filename and extension. This occurs because the ywgc-upload-picture parameter can have a .php value even though the intention was to only allow uploads of Gift Card images.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27559 β€Ό

The Contact page in Monica 2.19.1 allows stored XSS via the Nickname field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24175 β€Ό

Buffer overflow in Yz1 0.30 and 0.32, as used in IZArc 4.4, ZipGenius 6.3.2.3116, and Explzh (extension) 8.14, allows attackers to execute arbitrary code via a crafted archive file, related to filename handling.

πŸ“– Read

via "National Vulnerability Database".