πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Microsoft Tracks New BazaCall Malware Campaign πŸ•΄

Attackers use emails to prompt victims to call a fraudulent call center, where attackers instruct them to download a malicious file.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-18660 β€Ό

GetSimpleCMS <=3.3.15 has an open redirect in admin/changedata.php via the redirect function to the url parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ VMs Help Ransomware Attackers Evade Detection, But It's Uncommon πŸ•΄

Some ransomware attackers use virtual machines to bypass security detection, but adoption is slow for the complicated technique.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 79% of Third-Party Libraries in Apps Are Never Updated πŸ•΄

A lack of contextual information and concerns over application disruption among contributing factors.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-21809 β€Ό

A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32823 β€Ό

In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35041 β€Ό

The blockchain node in FISCO-BCOS V2.7.2 may have a bug when dealing with unformatted packet and lead to a crash. A malicious node can send a packet continuously. The packet is in an incorrect format and cannot be decoded by the node correctly. As a result, the node may consume the memory sustainably and crash. More details are shown at: https://github.com/FISCO-BCOS/FISCO-BCOS/issues/1951

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25652 β€Ό

An information disclosure vulnerability was discovered in the directory and file management of Avaya Aura Appliance Virtualization Platform Utilities (AVPU). This vulnerability may potentially allow any local user to access system functionality and configuration information that should only be available to a privileged user. Affects versions 8.0.0.0 through 8.1.3.1 of AVPU.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25655 β€Ό

A vulnerability in the system Service Menu component of Avaya Aura Experience Portal may allow URL Redirection to any untrusted site through a crafted attack. Affected versions include 7.0 through 7.2.3 (without hotfix) and 8.0.0 (without hotfix).

πŸ“– Read

via "National Vulnerability Database".
❌ 30M Dell Devices at Risk for Remote BIOS Attacks, RCE ❌

Four separate security bugs would give attackers almost complete control and persistence over targeted devices, thanks to a faulty update mechanism.

πŸ“– Read

via "Threat Post".
❌ Atlassian Bugs Could Have Led to 1-Click Takeover ❌

A supply-chain attack could have siphoned sensitive information out of Jira, such as security issues on Atlassian cloud, Bitbucket and on-prem products.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-21737 β€Ό

A smart STB product of ZTE is impacted by a permission and access control vulnerability. Due to insufficient protection of system application, attackers could use this vulnerability to tamper with the system desktop and affect system customization functions. This affects: ZXV10 B860H V5.0, V83011303.0010, V83011303.0016

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ rMTD: A Deception Method That Throws Attackers Off Their Game πŸ•΄

Through a variety of techniques, rotational Moving Target Defense makes existing OS and app vulnerabilities exponentially difficult to exploit. Here's how.

πŸ“– Read

via "Dark Reading".
❌ Tulsa’s Police-Citation Data Leaked by Conti Gang ❌

A May 6 ransomware attack caused disruption across several of the municipality’s online services and websites.

πŸ“– Read

via "Threat Post".
πŸ•΄ John McAfee, Creator of McAfee Antivirus Software, Dead at 75 πŸ•΄

McAfee, who was being held in a Spanish jail on US tax-evasion charges, had learned on Monday he would be extradited to the US.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Storms & Silver Linings: Avoiding the Dangers of Cloud Migration πŸ•΄

We hear a lot about the sunlit uplands of cloud-powered business, but what about the risks of making information available across the organization?

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-26585 β€Ό

A potential vulnerability has been identified in HPE OneView Global Dashboard release 2.31 which could lead to a local disclosure of privileged information. HPE has provided an update to OneView Global Dashboard. The issue is resolved in 2.32.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28097 β€Ό

The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.

πŸ“– Read

via "National Vulnerability Database".
🦿 Remote Access Trojan now targeting schools with ransomware 🦿

Dubbed ChaChi by researchers at BlackBerry, the RAT has recently shifted its focus from government agencies to schools in the US.

πŸ“– Read

via "Tech Republic".
⚠ S3 Ep38: Clop busts, destructive Linux hacking, and rooted bicycles [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
❌ Critical VMware Carbon Black Bug Allows Authentication Bypass ❌

The 9.4-rated bug in AppC could give attackers admin rights, no authentication required, letting them attack anything from PoS to industrial control systems.

πŸ“– Read

via "Threat Post".