πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ British tourists charged £1000s for pier visits in billing blunder ⚠

That's a LOT of money just to visit a seaside pier!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-35475 β€Ό

SAS Environment Manager 2.5 allows XSS through the Name field when creating/editing a server. The XSS will prompt when editing the Configuration Properties.

πŸ“– Read

via "National Vulnerability Database".
❌ Hackers Crack Pirated Games with Cryptojacking Malware ❌

Threat actors have so far made about $2 million from Crackonosh, which secretly mines Monero cryptocurrency from affected devices.

πŸ“– Read

via "Threat Post".
πŸ•΄ 7 Unconventional Pieces of Password Wisdom πŸ•΄

Challenging common beliefs about best practices in password hygiene.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-31615 β€Ό

Unencrypted Bluetooth Low Energy baseband links in Bluetooth Core Specifications 4.0 through 5.2 may permit an adjacent device to inject a crafted packet during the receive window of the listening device before the transmitting device initiates its packet transmission to achieve full MITM status without terminating the link. When applied against devices establishing or using encrypted links, crafted packets may be used to terminate an existing link, but will not compromise the confidentiality or integrity of the link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35049 β€Ό

Vulnerability in Fidelis Network and Deception CommandPost enables authenticated command injection through the web interface. The vulnerability could allow a specially crafted HTTP request to execute system commands on the CommandPost and return results in an HTTP response in an authenticated session. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.7 and in version 9.4. Patches and updates are available to address this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ High-Level FIN7 Member Sentenced to 7 Years in Prison πŸ•΄

Andrii Kolpakov, who served as a high-level pentester for the criminal group, was also ordered to pay $2.5 million in restitution.

πŸ“– Read

via "Dark Reading".
❌ My Book Live Users Wake Up to Wiped Devices, Active RCE Attacks ❌

β€œI am totally screwed,” one user wailed after finding years of data nuked. Western Digital advised yanking the NAS storage devices offline ASAP: There's an exploit.

πŸ“– Read

via "Threat Post".
πŸ•΄ School's Out for Summer, but Don't Close the Book on Cybersecurity Training πŸ•΄

Strengthening their security posture should be at the top of school IT departments' summer to-do list.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-34184 β€Ό

Miniaudio 0.10.35 has a Double free vulnerability that could cause a buffer overflow in ma_default_vfs_close__stdio in miniaudio.h.

πŸ“– Read

via "National Vulnerability Database".
❌ Cisco ASA Bug Now Actively Exploited as PoC Drops ❌

In-the-wild XSS attacks have commenced against the security appliance (CVE-2020-3580), as researchers publish exploit code on Twitter.

πŸ“– Read

via "Threat Post".
πŸ›  Flawfinder 2.0.18 πŸ› 

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

πŸ“– Read

via "Packet Storm Security".
πŸ” Friday Five 6/25 πŸ”

Ransomware debates, spyware indictments, and CISA confirmations- catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "".
πŸ•΄ Data Privacy Is in 23andMe CSO's DNA πŸ•΄

How serious is the company about safeguarding its customers and their genetic information? "We're hiding data even from ourselves," says the biotech and genetic testing company's head of security.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-3314 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** Oracle GlassFish Server 3.1.2.18 and below allows /common/logViewer/logViewer.jsf XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35501 β€Ό

PandoraFMS <=7.54 allows Stored XSS by placing a payload in the name field of a visual console. When a user or an administrator visits the console, the XSS payload will be executed.

πŸ“– Read

via "National Vulnerability Database".
❌ FIN7 β€˜Pen Tester’ Headed to Jail Amid $1B in Payment-Card Losses ❌

One of the Carbanak cybergang's highest-level hackers is destined to serve seven years while making $2.5 million in restitution payments.

πŸ“– Read

via "Threat Post".
🦿 Ransomware-as-a-service business model takes a hit in the aftermath of the Colonial Pipeline attack 🦿

Cybercrime gangs are finding it harder to recruit partners for the affiliate programs that power ransomware attacks.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-33529 β€Ό

In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from or to the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33532 β€Ό

In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33542 β€Ό

Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a remote code execution vulnerability. Manipulated PC Worx or Config+ projects could lead to a remote code execution when unallocated memory is freed because of incompletely initialized data. The attacker needs to get access to an original bus configuration file (*.bcp) to be able to manipulate data inside. After manipulation the attacker needs to exchange the original file by the manipulated one on the application programming workstation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities. Automated systems in operation which were programmed with one of the above-mentioned products are not affected.

πŸ“– Read

via "National Vulnerability Database".