🛡 Cybersecurity & Privacy 🛡 - News
26K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2021-23400

The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.

📖 Read

via "National Vulnerability Database".
CVE-2020-7871

A vulnerability of Helpcom could allow an unauthenticated attacker to execute arbitrary command. This vulnerability exists due to insufficient validation of the parameter. This issue affects: Cnesty Helpcom 10.0 versions prior to.

📖 Read

via "National Vulnerability Database".
🦿 Security and automation are top priorities for IT professionals 🦿

Data protection and lack of budgets and resources continue to present the biggest challenges as cyberattacks increase, according to a new Kaseya report.

📖 Read

via "Tech Republic".
🛠 Proxmark 4.13441 🛠

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware.

📖 Read

via "Packet Storm Security".
CVE-2020-7868

A remote code execution vulnerability exists in helpUS(remote administration tool) due to improper validation of parameter of ShellExecutionExA function used for login.

📖 Read

via "National Vulnerability Database".
CVE-2021-32992

FATEK Automation WinProladder Versions 3.30 and prior do not properly restrict operations within the bounds of a memory buffer, which may allow an attacker to execute arbitrary code.

📖 Read

via "National Vulnerability Database".
CVE-2021-31505

This vulnerability allows attackers with physical access to escalate privileges on affected installations of Arlo Q Plus 1.9.0.3_278. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SSH service. The device can be booted into a special operation mode where hard-coded credentials are accepted for SSH authentication. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-12890.

📖 Read

via "National Vulnerability Database".
CVE-2020-7870

A memory corruption vulnerability exists when ezPDF improperly handles the parameter. This vulnerability exists due to insufficient validation of the parameter.

📖 Read

via "National Vulnerability Database".
🦿 How to give users sudo privileges on Ubuntu and Red Hat-based Linux distributions in Linux 🦿

New Linux admins need to know how to give and take sudo privileges from users. Jack Wallen shows you how on both Ubuntu- and Red Hat-based Linux distributions.

📖 Read

via "Tech Republic".
Microsoft Translation Bugs Open Edge Browser to Trivial UXSS Attacks

The bug in Edge's auto-translate could have let remote attackers pull off RCE on any foreign-language website just by sending a message with an XSS payload.

📖 Read

via "Threat Post".
🕴 Technology's Complexity and Opacity Threaten Critical Infrastructure Security 🕴

Addressing the complexity of modern distributed software development is one of the most important things we can do to decrease supply chain risk.

📖 Read

via "Dark Reading".
CVE-2021-20104

Machform prior to version 16 is vulnerable to unauthenticated remote code execution due to insufficient sanitization of file attachments uploaded with forms through upload.php.

📖 Read

via "National Vulnerability Database".
CVE-2021-20105

Machform prior to version 16 is vulnerable to an open redirect in Safari_init.php due to an improperly sanitized 'ref' parameter.

📖 Read

via "National Vulnerability Database".
CVE-2021-20580

IBM Planning Analytics 2.0 could be vulnerable to cross-site request forgery (CSRF) which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 198241.

📖 Read

via "National Vulnerability Database".
🕴 Survey Data Reveals Gap in Americans' Security Awareness 🕴

Survey data reveals many people have never heard of major cyberattacks, including the attack targeting Colonial Pipeline.

📖 Read

via "Dark Reading".
🦿 How legitimate security tool Cobalt Strike is being used in cyberattacks 🦿

Normally used by organizations for penetration testing, Cobalt Strike is exploited by cybercriminals to launch attacks, says Proofpoint.

📖 Read

via "Tech Republic".
🦿 Cyberattacks and ransomware are no longer burglary; they're home invasion, expert says 🦿

More than 3.5 million people worldwide are needed to play defense against cyberattacks.

📖 Read

via "Tech Republic".
🕴 CISA Publishes Catalog of Poor Security Practices 🕴

Organizations often focus on promoting best practices, CISA says, but stopping poor security practices is equally important.

📖 Read

via "Dark Reading".
Users Clueless About Cybersecurity Risks: Study

The return to offices, coupled with uninformed users (including IT pros) has teed up an unprecedented risk of enterprise attack.

📖 Read

via "Threat Post".
🦿 iOS 15: How to enable Mail Privacy Protection 🦿

If you have access to Apple's iOS 15 Developer Beta, learn how to use an important security feature called Mail Privacy Protection.

📖 Read

via "Tech Republic".
CVE-2021-32721

PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. The issue is resolved in v1.1.1. There are no existing workarounds.

📖 Read

via "National Vulnerability Database".