🛡 Cybersecurity & Privacy 🛡 - News
26K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 3 Ways Cybercriminals Are Undermining MFA 🕴

Using multifactor authentication is an excellent security step, but like everything else, it is not foolproof and will never be 100% effective.

📖 Read

via "Dark Reading".
CVE-2021-23400

The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.

📖 Read

via "National Vulnerability Database".
CVE-2020-7871

A vulnerability of Helpcom could allow an unauthenticated attacker to execute arbitrary command. This vulnerability exists due to insufficient validation of the parameter. This issue affects: Cnesty Helpcom 10.0 versions prior to.

📖 Read

via "National Vulnerability Database".
🦿 Security and automation are top priorities for IT professionals 🦿

Data protection and lack of budgets and resources continue to present the biggest challenges as cyberattacks increase, according to a new Kaseya report.

📖 Read

via "Tech Republic".
🛠 Proxmark 4.13441 🛠

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware.

📖 Read

via "Packet Storm Security".
CVE-2020-7868

A remote code execution vulnerability exists in helpUS(remote administration tool) due to improper validation of parameter of ShellExecutionExA function used for login.

📖 Read

via "National Vulnerability Database".
CVE-2021-32992

FATEK Automation WinProladder Versions 3.30 and prior do not properly restrict operations within the bounds of a memory buffer, which may allow an attacker to execute arbitrary code.

📖 Read

via "National Vulnerability Database".
CVE-2021-31505

This vulnerability allows attackers with physical access to escalate privileges on affected installations of Arlo Q Plus 1.9.0.3_278. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SSH service. The device can be booted into a special operation mode where hard-coded credentials are accepted for SSH authentication. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-12890.

📖 Read

via "National Vulnerability Database".
CVE-2020-7870

A memory corruption vulnerability exists when ezPDF improperly handles the parameter. This vulnerability exists due to insufficient validation of the parameter.

📖 Read

via "National Vulnerability Database".
🦿 How to give users sudo privileges on Ubuntu and Red Hat-based Linux distributions in Linux 🦿

New Linux admins need to know how to give and take sudo privileges from users. Jack Wallen shows you how on both Ubuntu- and Red Hat-based Linux distributions.

📖 Read

via "Tech Republic".
Microsoft Translation Bugs Open Edge Browser to Trivial UXSS Attacks

The bug in Edge's auto-translate could have let remote attackers pull off RCE on any foreign-language website just by sending a message with an XSS payload.

📖 Read

via "Threat Post".
🕴 Technology's Complexity and Opacity Threaten Critical Infrastructure Security 🕴

Addressing the complexity of modern distributed software development is one of the most important things we can do to decrease supply chain risk.

📖 Read

via "Dark Reading".
CVE-2021-20104

Machform prior to version 16 is vulnerable to unauthenticated remote code execution due to insufficient sanitization of file attachments uploaded with forms through upload.php.

📖 Read

via "National Vulnerability Database".
CVE-2021-20105

Machform prior to version 16 is vulnerable to an open redirect in Safari_init.php due to an improperly sanitized 'ref' parameter.

📖 Read

via "National Vulnerability Database".
CVE-2021-20580

IBM Planning Analytics 2.0 could be vulnerable to cross-site request forgery (CSRF) which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 198241.

📖 Read

via "National Vulnerability Database".
🕴 Survey Data Reveals Gap in Americans' Security Awareness 🕴

Survey data reveals many people have never heard of major cyberattacks, including the attack targeting Colonial Pipeline.

📖 Read

via "Dark Reading".
🦿 How legitimate security tool Cobalt Strike is being used in cyberattacks 🦿

Normally used by organizations for penetration testing, Cobalt Strike is exploited by cybercriminals to launch attacks, says Proofpoint.

📖 Read

via "Tech Republic".
🦿 Cyberattacks and ransomware are no longer burglary; they're home invasion, expert says 🦿

More than 3.5 million people worldwide are needed to play defense against cyberattacks.

📖 Read

via "Tech Republic".
🕴 CISA Publishes Catalog of Poor Security Practices 🕴

Organizations often focus on promoting best practices, CISA says, but stopping poor security practices is equally important.

📖 Read

via "Dark Reading".
Users Clueless About Cybersecurity Risks: Study

The return to offices, coupled with uninformed users (including IT pros) has teed up an unprecedented risk of enterprise attack.

📖 Read

via "Threat Post".
🦿 iOS 15: How to enable Mail Privacy Protection 🦿

If you have access to Apple's iOS 15 Developer Beta, learn how to use an important security feature called Mail Privacy Protection.

📖 Read

via "Tech Republic".