πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Email Bug Allows Message Snooping, Credential Theft ❌

A year-old proof-of-concept attack that allows an attacker to bypass TLS email protections to snoop on messages has been patched.

πŸ“– Read

via "Threat Post".
🦿 How a Business Email Compromise attack can threaten your organization 🦿

The most common type of BEC campaign involves a spoofed email account or website, according to GreatHorn.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Transmit Security Announces $543M Series A Funding Round πŸ•΄

The passwordless technology provider says the funding will be used to increase its reach and expand primary business functions.

πŸ“– Read

via "Dark Reading".
❌ Cryptominers Slither into Python Projects in Supply-Chain Campaign ❌

These code bombs lurk in the PyPI package repository, waiting to be inadvertently baked into software developers' applications.

πŸ“– Read

via "Threat Post".
πŸ›  Clam AntiVirus Toolkit 0.103.3 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2021-22377 β€Ό

There is a command injection vulnerability in S12700 V200R019C00SPC500, S2700 V200R019C00SPC500, S5700 V200R019C00SPC500, S6700 V200R019C00SPC500 and S7700 V200R019C00SPC500. A module does not verify specific input sufficiently. Attackers can exploit this vulnerability by sending malicious parameters to inject command. This can compromise normal service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22382 β€Ό

Huawei LTE USB Dongle products have an improper permission assignment vulnerability. An attacker can locally access and log in to a PC to induce a user to install a specially crafted application. After successfully exploiting this vulnerability, the attacker can perform unauthenticated operations. Affected product versions include:E3372 E3372h-153TCPU-V200R002B333D01SP00C00.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22361 β€Ό

There is an improper authorization vulnerability in eCNS280 V100R005C00, V100R005C10 and eSE620X vESS V100R001C10SPC200, V100R001C20SPC200. A file access is not authorized correctly. Attacker with low access may launch privilege escalation in a specific scenario. This may compromise the normal service.

πŸ“– Read

via "National Vulnerability Database".
❌ BEC Losses Top $1.8B as Tactics Evolve ❌

BEC attacks getting are more dangerous, and smart users are the ones who can stop it.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-32699 β€Ό

Wings is the control plane software for the open source Pterodactyl game management system. All versions of Pterodactyl Wings prior to `1.4.4` are vulnerable to system resource exhaustion due to improper container process limits being defined. A malicious user can consume more resources than intended and cause downstream impacts to other clients on the same hardware, eventually causing the physical server to stop responding. Users should upgrade to `1.4.4` to mitigate the issue. There is no non-code based workaround for impacted versions of the software. Users running customized versions of this software can manually set a PID limit for containers created.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32700 β€Ό

Ballerina is an open source programming language and platform for cloud application programmers. Ballerina versions 1.2.x and SL releases up to alpha 3 have a potential for a supply chain attack via MiTM against users. Http connections did not make use of TLS and certificate checking was ignored. The vulnerability allows an attacker to substitute or modify packages retrieved from BC thus allowing to inject malicious code into ballerina executables. This has been patched in Ballerina 1.2.14 and Ballerina SwanLake alpha4.

πŸ“– Read

via "National Vulnerability Database".
🦿 Data resiliency is key to surviving a ransomware attack, expert says 🦿

It's not "if" but "when" you'll be attacked, cybersecurity expert says. Checking on your data and backups is something businesses should do regularly.

πŸ“– Read

via "Tech Republic".
🦿 How to be prepared for a ransomware attack: Check your data and backups 🦿

Expert says ransomware attacks will happen, and your company has to be prepared long before the attack hits.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Despite Heightened Cyber-Risks, Few Security Leaders Report to CEO πŸ•΄

A new report suggests that top management at most companies still don't get security.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-34391 β€Ό

Trusty TLK contains a vulnerability in the NVIDIA TLK kernel�s tz_handle_trusted_app_smc function where a lack of integer overflow checks on the req_off and param_ofs variables leads to memory corruption of critical kernel structures.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34396 β€Ό

Bootloader contains a vulnerability in access permission settings where unauthorized software may be able to overwrite NVIDIA MB2 code, which would result in limited denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34393 β€Ό

Trusty contains a vulnerability in TSEC TA which deserializes the incoming messages even though the TSEC TA does not expose any command. This vulnerability might allow an attacker to exploit the deserializer to impact code execution, causing information disclosure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34395 β€Ό

Trusty TLK contains a vulnerability in its access permission settings where it does not properly restrict access to a resource from a user with local privileges, which might lead to limited information disclosure and limited denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34397 β€Ό

Bootloader contains a vulnerability in NVIDIA MB2, which may cause free-the-wrong-heap, which may lead to limited denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34392 β€Ό

Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map_shared_mem function can bypass boundary checks, which might lead to denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34390 β€Ό

Trusty TLK contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow on the size parameter of the tz_map_shared_mem function.

πŸ“– Read

via "National Vulnerability Database".