πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ What Colonial Pipeline Means for Commercial Building Cybersecurity πŸ•΄

Banks and hospitals may be common targets, but now commercial real estate must learn to protect itself against stealthy hackers.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-21779 β€Ό

A use-after-free vulnerability exists in the way WebkitÒ€ℒs GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ The NSA's 'New' Mission: Get More Public With the Private Sector πŸ•΄

The National Security Agency's gradual emergence from the shadows was "inevitable" in cybersecurity, says Vinnie Liu, co-founder and CEO of offensive security firm Bishop Fox and a former NSA analyst. Now the agency has to figure out how to best work with the private sector, especially organizations outside the well-resourced and seasoned Fortune 100.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Kaseya Hacked via Authentication Bypass πŸ•΄

The Kaseya ransomware attack is believed to have been down to an authentication bypass. Yes, ransomware needs to be on your radar -- but good authentication practices are also imperative.

πŸ“– Read

via "Dark Reading".
🦿 Android app users targeted with cryptomining scams 🦿

Found on Google Play and third-party app stores, the apps discovered by Lookout stole an estimated $350,000 from more than 93,000 people.

πŸ“– Read

via "Tech Republic".
🦿 77% of executives plan to hire in the months ahead, according to a new poll 🦿

West Monroe's executive poll details third-quarter hiring expectations, cybersecurity preparedness, investments to digitize business operations and more.

πŸ“– Read

via "Tech Republic".
🦿 "Black Widow" digital premier a cover for malware and scams, says Kaspersky 🦿

Phishing, malicious files and other forms of fraud have followed the highly awaited movie since it was first delayed due to COVID-19. On the eve of its actual release, the scams have begun anew.

πŸ“– Read

via "Tech Republic".
❌ How Fake Accounts and Sneaker-Bots Took Over the Internet ❌

Jason Kent, hacker-in-residence at Cequence Security, discusses fake online accounts, and the fraud they carry out on a daily basis.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-29150 β€Ό

A remote insecure deserialization vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25440 β€Ό

Improper access control vulnerability in FactoryCameraFB prior to version 3.4.74 allows untrusted applications to access arbitrary files with an escalated privilege.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25439 β€Ό

Improper access control vulnerability in Samsung Members prior to versions 2.4.85.11 in Android O(8.1) and below, and 3.9.10.11 in Android P(9.0) and above allows untrusted applications to cause arbitrary webpage loading in webview.

πŸ“– Read

via "National Vulnerability Database".
⚠ PrintNightmare official patch is out – update now! ⚠

Patch now! This security hole could allow almost anyone to take over your whole network from almost any account on almost any computer.

πŸ“– Read

via "Naked Security".
🦿 Microsoft patches remaining versions of Windows against PrintNightmare flaw 🦿

Patches to fix a severe flaw in the Windows Print spooler are now available for Windows 10 Version 1607, Windows Server 2012 and Windows Server 2016.

πŸ“– Read

via "Tech Republic".
❌ Coursera Flunks API Security Test in Researchers’ Exam ❌

The problem APIs included numero uno on the OWASP API Security Top 10: a Broken Object Level Authorization (BOLA) issue that could have exposed personal data.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-29711 β€Ό

IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 6.2.7.8 , 6.2.7.9, 7.0.3.0, 7.0.4.0, 7.0.5.4, 7.1.0.0, 7.1.1.0, 7.1.1.1, and 7.1.1.2 could allow an authenticated user with certain permissions to initiate an agent upgrade through the CLI interface. IBM X-Force ID: 200965.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34609 β€Ό

A remote SQL injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to define DNS in Docker containers 🦿

Jack Wallen shows you how to configure specific DNS servers for your Docker container deployments.

πŸ“– Read

via "Tech Republic".
πŸ•΄ New WildPressure Malware Capable of Targeting Windows and MacOS πŸ•΄

The Trojan sends information back to the attackers' servers about the programming language of a target device.

πŸ“– Read

via "Dark Reading".
❌ Oil & Gas Targeted in Year-Long Cyber-Espionage Campaign ❌

A global effort to steal information from energy companies is using sophisticated social engineering to deliver Agent Tesla and other RATs.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-20363 β€Ό

Crossi Site Scripting (XSS) vulnerability in PbootCMS 2.0.3 in admin.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1596 β€Ό

Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Video Surveillance 7000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. These vulnerabilities are due to incorrect processing of certain LLDP packets at ingress time. An attacker could exploit these vulnerabilities by sending crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DoS condition. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).

πŸ“– Read

via "National Vulnerability Database".