πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ SOC Investment Improves Detection and Response Times, Data Shows πŸ•΄

A survey of IT and security pros finds many are confident in their ability to detect security incidents in near-real time or within minutes.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft Issues New CVE for 'PrintNightmare' Flaw πŸ•΄

Company says remote code execution issue in all Windows versions is different from one in Windows Print Spooler that it had patched last month, though both affect same function.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Secured-Core PCs May Mitigate Firmware Attacks, But Adoption Lags πŸ•΄

Microsoft maintains that exploitation of recent Dell vulnerabilities would be blocked on ultra-secure PCs - but most systems do not have the technology yet.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-23402 β€Ό

All versions of package record-like-deep-assign are vulnerable to Prototype Pollution via the main functionality.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Barracuda Agrees to Acquire Skout Cybersecurity πŸ•΄

The acquisition will bring Barracuda into the extended detection and response (XDR) market with a tool for managed service providers.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-32737 β€Ό

Sulu is an open-source PHP content management system based on the Symfony framework. In versions of Sulu prior to 1.6.41, it is possible for a logged in admin user to add a script injection (cross-site-scripting) in the collection title. The problem is patched in version 1.6.41. As a workaround, one may manually patch the affected JavaScript files in lieu of updating.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23185 β€Ό

A stored cross site scripting (XSS) vulnerability in /administration/setting_security.php of PHP-Fusion 9.03.60 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23178 β€Ό

An issue exists in PHP-Fusion 9.03.50 where session cookies are not deleted once a user logs out, allowing for an attacker to perform a session replay attack and impersonate the victim user.

πŸ“– Read

via "National Vulnerability Database".
🦿 You don't have to be a tech expert to become a cybersecurity pro 🦿

Attention to detail, creativity and perseverance are key traits for a good white hat hacker. These positions are in high demand.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-36146 β€Ό

ACRN before 2.5 has a devicemodel/hw/pci/xhci.c NULL Pointer Dereference for a trb pointer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34527 β€Ό

Windows Print Spooler Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
❌ Ransomware Defense: Top 5 Things to Do Right Now ❌

Matt Bromiley, senior consultant with Mandiant Managed Defense, discusses the top tricks and tips for protecting enterprise environments from ransomware.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-23401 β€Ό

This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Watch for Cybersecurity Games at the Tokyo Olympics πŸ•΄

The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications.

πŸ“– Read

via "Dark Reading".
⚠ Kaseya ransomware attackers say: β€œPay $70 million and we’ll set everyone free” ⚠

Are you feeling generous? Do you want to help others? These cybercriminals are hoping someone is and does...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2020-26763 β€Ό

The Rocket.Chat desktop application 2.17.11 opens external links without user interaction.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.5.7 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Read

via "Packet Storm Security".
⚠ Kaseya ransomware attackers say: β€œPay $70 million and we’ll set everyone free” ⚠

Are you feeling generous? Do you want to help others? These cybercriminals are hoping someone is and does...

πŸ“– Read

via "Naked Security".
⚠ S3 Ep 39.5: A conversation with Eva Galperin [Podcast] ⚠

Cryptography, privacy, stalkerware and how infosec professionals relax. Listen, enjoy and learn!

πŸ“– Read

via "Naked Security".
❌ Kaseya Attack Fallout: CISA, FBI Offer Guidance ❌

Following a brazen ransomware attack by the REvil cybergang, CISA and FBI offer guidance to victims.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-36158 β€Ό

In the xrdp package (in branches through 3.14) for Alpine Linux, RDP sessions are vulnerable to man-in-the-middle attacks because pre-generated RSA certificates and private keys are used.

πŸ“– Read

via "National Vulnerability Database".