πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-9493 β€Ό

A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.

πŸ“– Read

via "National Vulnerability Database".
❌ Peloton Bike+ Bug Gives Hackers Complete Control ❌

An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios.

πŸ“– Read

via "Threat Post".
❌ Researchers: Booming Cyber-Underground Market for Initial-Access Brokers ❌

Ransomware gangs are increasingly buying their way into corporate networks, purchasing access from 'vendors' that have previously installed backdoors on targets.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-21441 β€Ό

There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
❌ 5 Tips to Prevent and Mitigate Ransomware Attacks ❌

Ransomware attacks are increasing in frequency, and the repercussions are growing more severe than ever. Here are 5 ways to prevent your company from becoming the next headline.

πŸ“– Read

via "Threat Post".
🦿 The many ways a ransomware attack can hurt your organization 🦿

Loss of revenue, brand and reputation damage, employee layoffs and business closures were some of the effects of a ransomware attack, according to Cybereason.

πŸ“– Read

via "Tech Republic".
⚠ Clop ransomware suspects busted in Ukraine, money and motors seized ⚠

Victims in South Korea and the USA, suspects busted in Ukraine.

πŸ“– Read

via "Naked Security".
πŸ•΄ Don't Get Stymied by Security Indecision πŸ•΄

You might be increasing cyber-risk by not actively working to reduce it.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-27485 β€Ό

ZOLL Defibrillator Dashboard, v prior to 2.2,The application allows users to store their passwords in a recoverable format, which could allow an attacker to retrieve the credentials from the web browser.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31857 β€Ό

In Zoho ManageEngine Password Manager Pro before 11.1 build 11104, attackers are able to retrieve credentials via a browser extension for non-website resource types.

πŸ“– Read

via "National Vulnerability Database".
🦿 Akamai adds automation and machine learning to protect user accounts, APIs and applications 🦿

Edge platform cybersecurity enhancements are intended to increase responsiveness and augment decision-making, the company said.

πŸ“– Read

via "Tech Republic".
❌ Euros-Driven Football Fever Nets Dumb Passwords ❌

The top easy-to-crack, football-inspired password in a database of 1 billion unique, clear-text, breached passwords? You probably guessed it: "Football."

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-21668 β€Ό

Jenkins Scriptler Plugin 3.1 and earlier does not escape script content, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8299 β€Ό

Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance.

πŸ“– Read

via "National Vulnerability Database".
❌ Takeaways from the Colonial Pipeline Ransomware Attack ❌

The incident showcases basic steps that organizations can take to protect themselves as ransomware gangs get smarter.

πŸ“– Read

via "Threat Post".
πŸ•΄ Keeping Your Organization Secure When Dealing With the Unexpected πŸ•΄

There's no way to anticipate every possible scenario, but the right approach to business continuity can help you respond effectively in any situation.

πŸ“– Read

via "Dark Reading".
❌ Ransomware Poll: 80% of Victims Don’t Pay Up ❌

Meanwhile, in a separate survey, 80 percent of organizations that paid the ransom said were hit by a second attack.

πŸ“– Read

via "Threat Post".
πŸ•΄ Is an Attacker Living Off Your Land? πŸ•΄

Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-20444 β€Ό

Jact OpenClinic 0.8.20160412 allows the attacker to read server files after login to the the admin account by an infected 'file' GET parameter in '/shared/view_source.php' which "could" lead to RCE vulnerability .

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-22199 β€Ό

SQL Injection vulnerability in phpCMS 2007 SP6 build 0805 via the digg_mod parameter to digg_add.php.

πŸ“– Read

via "National Vulnerability Database".
❌ IKEA Fined $1.2M for Elaborate β€˜Spying System’ ❌

A French court fined the furniture giant for illegal surveillance on 400 customers and staff.

πŸ“– Read

via "Threat Post".