πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Pandemic-Bored Attackers Pummeled Gaming Industry ❌

Akamai's 2020 gaming report shows that cyberattacks on the video game industry skyrocketed, shooting up 340 percent in 2020.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-3526 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33624 β€Ό

In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.

πŸ“– Read

via "National Vulnerability Database".
❌ Iran Media Websites Seized by U.S. in Disinformation Campaign ❌

DoJ uses sanctions laws to shut down an alleged Iranian government malign influence campaign.

πŸ“– Read

via "Threat Post".
πŸ•΄ Survey Seeks to Learn How 2020 Changed Security πŸ•΄

Respondents to a new Dark Reading/Omdia survey will be entered into a drawing for a Black Hat Black Card.

πŸ“– Read

via "Dark Reading".
πŸ•΄ New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies πŸ•΄

Researchers found a "novel" class of DNS vulnerabilities in AWS Route53 and other DNS-as-a-service offerings that leak sensitive information on corporate and government customers, with one simple registration step.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-18657 β€Ό

Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Tracks New BazaCall Malware Campaign πŸ•΄

Attackers use emails to prompt victims to call a fraudulent call center, where attackers instruct them to download a malicious file.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-18660 β€Ό

GetSimpleCMS <=3.3.15 has an open redirect in admin/changedata.php via the redirect function to the url parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ VMs Help Ransomware Attackers Evade Detection, But It's Uncommon πŸ•΄

Some ransomware attackers use virtual machines to bypass security detection, but adoption is slow for the complicated technique.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 79% of Third-Party Libraries in Apps Are Never Updated πŸ•΄

A lack of contextual information and concerns over application disruption among contributing factors.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-21809 β€Ό

A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32823 β€Ό

In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35041 β€Ό

The blockchain node in FISCO-BCOS V2.7.2 may have a bug when dealing with unformatted packet and lead to a crash. A malicious node can send a packet continuously. The packet is in an incorrect format and cannot be decoded by the node correctly. As a result, the node may consume the memory sustainably and crash. More details are shown at: https://github.com/FISCO-BCOS/FISCO-BCOS/issues/1951

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25652 β€Ό

An information disclosure vulnerability was discovered in the directory and file management of Avaya Aura Appliance Virtualization Platform Utilities (AVPU). This vulnerability may potentially allow any local user to access system functionality and configuration information that should only be available to a privileged user. Affects versions 8.0.0.0 through 8.1.3.1 of AVPU.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25655 β€Ό

A vulnerability in the system Service Menu component of Avaya Aura Experience Portal may allow URL Redirection to any untrusted site through a crafted attack. Affected versions include 7.0 through 7.2.3 (without hotfix) and 8.0.0 (without hotfix).

πŸ“– Read

via "National Vulnerability Database".
❌ 30M Dell Devices at Risk for Remote BIOS Attacks, RCE ❌

Four separate security bugs would give attackers almost complete control and persistence over targeted devices, thanks to a faulty update mechanism.

πŸ“– Read

via "Threat Post".
❌ Atlassian Bugs Could Have Led to 1-Click Takeover ❌

A supply-chain attack could have siphoned sensitive information out of Jira, such as security issues on Atlassian cloud, Bitbucket and on-prem products.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-21737 β€Ό

A smart STB product of ZTE is impacted by a permission and access control vulnerability. Due to insufficient protection of system application, attackers could use this vulnerability to tamper with the system desktop and affect system customization functions. This affects: ZXV10 B860H V5.0, V83011303.0010, V83011303.0016

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ rMTD: A Deception Method That Throws Attackers Off Their Game πŸ•΄

Through a variety of techniques, rotational Moving Target Defense makes existing OS and app vulnerabilities exponentially difficult to exploit. Here's how.

πŸ“– Read

via "Dark Reading".
❌ Tulsa’s Police-Citation Data Leaked by Conti Gang ❌

A May 6 ransomware attack caused disruption across several of the municipality’s online services and websites.

πŸ“– Read

via "Threat Post".