πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Why employees need counterespionage training 🦿

Two experts are concerned that employees are no match for nation-state spy services tasked with obtaining a company's vital intellectual property.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-32682 β€Ό

elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards' πŸ•΄

Best practices guide encompasses integrity, hardening, resilience, and monitoring of PLCs in industrial networks.

πŸ“– Read

via "Dark Reading".
πŸ” Colorado Passes State Privacy Act, Poised to Become Law πŸ”

Once it's signed into law, the bill will become the third comprehensive state privacy law in the U.S. after California and Virginia.

πŸ“– Read

via "".
πŸ•΄ Google Workspace Adds Client-Side Encryption πŸ•΄

Users given control over encryption keys, Google says.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-21556 β€Ό

Dell PowerEdge R640, R740, R740XD, R840, R940, R940xa, MX740c, MX840c, and T640 Server BIOS contain a stack-based buffer overflow vulnerability in systems with NVDIMM-N installed. A local malicious user with high privileges may potentially exploit this vulnerability, leading to a denial of Service, arbitrary code execution, or information disclosure in UEFI or BIOS Preboot Environment.

πŸ“– Read

via "National Vulnerability Database".
❌ Utilities β€˜Concerningly’ at Risk from Active Exploits ❌

Utilities’ vulnerability to application exploits goes from bad to worse in just weeks.  

πŸ“– Read

via "Threat Post".
πŸ•΄ Cyber Analytics Database Exposed 5 Billion Records Online πŸ•΄

In an ironic twist, Cognyte's data alerts customers to third-party data exposures.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-0324 β€Ό

Product: AndroidVersions: Android SoCAndroid ID: A-175402462

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0467 β€Ό

In Chromecast bootROM, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege in the bootloader, with physical USB access, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-174490700

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ VPN Attacks Surged in First Quarter πŸ•΄

But volume of malware, botnet, and other exploit activity declined because of the Emotet botnet takedown.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-34693 β€Ό

net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27887 β€Ό

Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victimÒ€ℒs browser. This issue affects: Hitachi ABB Power Grids Ellipse APM 5.3 version 5.3.0.1 and prior versions; 5.2 version 5.2.0.3 and prior versions; 5.1 version 5.1.0.6 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31618 β€Ό

Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.

πŸ“– Read

via "National Vulnerability Database".
❌ Apple Hurries Patches for Safari Bugs Under Active Attack ❌

Apple patched two bugs impacting its Safari browser WebKit engine that it said are actively being exploited.

πŸ“– Read

via "Threat Post".
⚠ β€œFace of Anonymous” suspect deported from Mexico to face US hacking charges ⚠

After nearly a decade as a US expat dubbed "The Face of Anoynmous", he's back in the US facing cybercrime charges from almost a decade ago.

πŸ“– Read

via "Naked Security".
❌ Microsoft Gets Second Shot at Banning hiQ from Scraping LinkedIn User Data ❌

Decision throws out previous ruling in favor of hiQ Labs that prevented Microsoft’s business networking platform to forbid the company from harvesting public info from user profiles.

πŸ“– Read

via "Threat Post".
🦿 Microsoft product vulnerabilities reached a new high of 1,268 in 2020 🦿

56% of all Microsoft critical vulnerabilities could have been mitigated by removing admin rights, according to the 2021 BeyondTrust Microsoft Vulnerabilities Report.

πŸ“– Read

via "Tech Republic".
πŸ•΄ How Does the Government Buy Its Cybersecurity? πŸ•΄

The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.

πŸ“– Read

via "Dark Reading".
❌ SASE & Zero Trust: The Dream Team ❌

Forcepoint’s Nico Fischbach, global CTO and VPE of SASE, and Chase Cunningham, chief strategy officer at Ericom Software, on using SASE to make Zero Trust real.

πŸ“– Read

via "Threat Post".
πŸ›  Hashcat Advanced Password Recovery 6.2.2 Source Code πŸ› 

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.

πŸ“– Read

via "Packet Storm Security".