πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-34390 β€Ό

Trusty TLK contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow on the size parameter of the tz_map_shared_mem function.

πŸ“– Read

via "National Vulnerability Database".
❌ SonicWall β€˜Botches’ October Patch for Critical VPN Bug ❌

Company finally rolls out the complete fix this week for an RCE flaw affecting some 800,000 devices that could result in crashes or prevent users from connecting to corporate resources.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-35210 β€Ό

Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29084 β€Ό

Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in Security Advisor report management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
❌ Unpatched Linux Marketplace Bugs Allow Wormable Attacks, Drive-By RCE ❌

A pair of zero-days affecting Pling-based marketplaces could allow for some ugly attacks on unsuspecting Linux enthusiasts -- with no patches in sight.

πŸ“– Read

via "Threat Post".
πŸ•΄ Expecting the Unexpected: Tips for Effectively Mitigating Ransomware Attacks in 2021 πŸ•΄

Cybercriminals continually innovate to thwart security protocols, but organizations can take steps to prevent and mitigate ransomware attacks.

πŸ“– Read

via "Dark Reading".
🦿 How to better detect and prevent Business Email Compromise attacks 🦿

These types of email attacks rely on simple language and exploit human nature to scam their victims, making detection difficult, says Cisco Talos.

πŸ“– Read

via "Tech Republic".
❌ REvil Ransomware Code Ripped Off by Rivals ❌

The LV ransomware operators likely used a hex editor to repurpose a REvil binary almost wholesale, for their own nefarious purposes.

πŸ“– Read

via "Threat Post".
🦿 Employees are valuable assets: Why you need to safeguard them 🦿

Two experts suggest calling employees "insider threats" is counterproductive; employees are assets needing protection.

πŸ“– Read

via "Tech Republic".
❌ Critical Palo Alto Cyber-Defense Bug Allows Remote β€˜War Room’ Access ❌

Remote, unauthenticated cyberattackers can infiltrate and take over the Cortex XSOAR platform, which anchors unified threat intelligence and incident responses.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-25950 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20391 β€Ό

Cross Site Scripting vulnerability in GetSimpleCMS 3.4.0a in admin/snippets.php via (1) Add Snippet and (2) Save snippets.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2011-1955 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
πŸ” An Interview with Ben McGraw, Cybersecurity Manager at Digital Guardian Part I πŸ”

In part one of our Q&A with Ben McGraw, we discuss his journey to Digital Guardian, insight from DG's Analytics & Reporting Cloud, and what makes a good threat hunter.

πŸ“– Read

via "".
🦿 Cybersecurity practices must be applied to vehicles, too 🦿

Manufacturers want to pack cars and trucks full of technology, but they need to remember the dangers to those who drive or ride in them.

πŸ“– Read

via "Tech Republic".
πŸ•΄ When Will Cybersecurity Operations Adopt the Peter Parker Principle? πŸ•΄

Having a prevention mindset means setting our prevention capabilities to "prevent" instead of relying on detection and response.

πŸ“– Read

via "Dark Reading".
❌ Pandemic-Bored Attackers Pummeled Gaming Industry ❌

Akamai's 2020 gaming report shows that cyberattacks on the video game industry skyrocketed, shooting up 340 percent in 2020.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-3526 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33624 β€Ό

In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.

πŸ“– Read

via "National Vulnerability Database".
❌ Iran Media Websites Seized by U.S. in Disinformation Campaign ❌

DoJ uses sanctions laws to shut down an alleged Iranian government malign influence campaign.

πŸ“– Read

via "Threat Post".
πŸ•΄ Survey Seeks to Learn How 2020 Changed Security πŸ•΄

Respondents to a new Dark Reading/Omdia survey will be entered into a drawing for a Black Hat Black Card.

πŸ“– Read

via "Dark Reading".