πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-25439 β€Ό

Improper access control vulnerability in Samsung Members prior to versions 2.4.85.11 in Android O(8.1) and below, and 3.9.10.11 in Android P(9.0) and above allows untrusted applications to cause arbitrary webpage loading in webview.

πŸ“– Read

via "National Vulnerability Database".
⚠ PrintNightmare official patch is out – update now! ⚠

Patch now! This security hole could allow almost anyone to take over your whole network from almost any account on almost any computer.

πŸ“– Read

via "Naked Security".
🦿 Microsoft patches remaining versions of Windows against PrintNightmare flaw 🦿

Patches to fix a severe flaw in the Windows Print spooler are now available for Windows 10 Version 1607, Windows Server 2012 and Windows Server 2016.

πŸ“– Read

via "Tech Republic".
❌ Coursera Flunks API Security Test in Researchers’ Exam ❌

The problem APIs included numero uno on the OWASP API Security Top 10: a Broken Object Level Authorization (BOLA) issue that could have exposed personal data.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-29711 β€Ό

IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 6.2.7.8 , 6.2.7.9, 7.0.3.0, 7.0.4.0, 7.0.5.4, 7.1.0.0, 7.1.1.0, 7.1.1.1, and 7.1.1.2 could allow an authenticated user with certain permissions to initiate an agent upgrade through the CLI interface. IBM X-Force ID: 200965.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34609 β€Ό

A remote SQL injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to define DNS in Docker containers 🦿

Jack Wallen shows you how to configure specific DNS servers for your Docker container deployments.

πŸ“– Read

via "Tech Republic".
πŸ•΄ New WildPressure Malware Capable of Targeting Windows and MacOS πŸ•΄

The Trojan sends information back to the attackers' servers about the programming language of a target device.

πŸ“– Read

via "Dark Reading".
❌ Oil & Gas Targeted in Year-Long Cyber-Espionage Campaign ❌

A global effort to steal information from energy companies is using sophisticated social engineering to deliver Agent Tesla and other RATs.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-20363 β€Ό

Crossi Site Scripting (XSS) vulnerability in PbootCMS 2.0.3 in admin.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1596 β€Ό

Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Video Surveillance 7000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. These vulnerabilities are due to incorrect processing of certain LLDP packets at ingress time. An attacker could exploit these vulnerabilities by sending crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DoS condition. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1603 β€Ό

Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user. These vulnerabilities exist because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker would need valid administrative credentials.

πŸ“– Read

via "National Vulnerability Database".
πŸ” CEO, COO Indicted in Biotech IP Theft Case’s Latest Turn πŸ”

Two executives reportedly used stolen intellectual property to build their company up to a nearly $1 billion valuation, the DOJ announced this week.

πŸ“– Read

via "".
πŸ•΄ Morgan Stanley Discloses Data Breach πŸ•΄

Attackers were able to compromise customers' personal data by targeting the Accellion FTA server of a third-party vendor.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-34613 β€Ό

A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.

πŸ“– Read

via "National Vulnerability Database".
❌ Lazarus Targets Job-Seeking Engineers with Malicious Documents ❌

Notorious North Korean APT impersonates Airbus, General Motors and Rheinmetall to lure potential victims into downloading malware.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-3570 β€Ό

A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Friday Five 7/9 πŸ”

Ransomware negotiators, cyber risks to the financial system, and why traditional passwords are here to stay - catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "".
πŸ•΄ Cartoon Caption Winner: Sight Unseen πŸ•΄

And the winner of Dark Reading's June contest is ...

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2012-5632 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2012-0832 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".