πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-19721 β€Ό

A heap buffer overflow vulnerability in Ap4TrunAtom.cpp of Bento 1.5.1-628 may lead to an out-of-bounds write while running mp42aac, leading to system crashes and a denial of service (DOS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19715 β€Ό

An integer overflow vulnerability in the getUShort function of Exiv2 0.27.1 results in segmentation faults within the application, leading to a denial of service (DOS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20781 β€Ό

Cross-site request forgery (CSRF) vulnerability in WordPress Meta Data Filter & Taxonomies Filter versions prior to v.1.2.8 and versions prior to v.2.2.8 allows remote attackers to hijack the authentication of administrators via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20782 β€Ό

Cross-site request forgery (CSRF) vulnerability in Software License Manager versions prior to 4.4.6 allows remote attackers to hijack the authentication of administrators via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36373 β€Ό

When reading a specially crafted TAR archive an Apache Ant build can be made to allocate large amounts of memory that finally leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Apache Ant prior to 1.9.16 and 1.10.11 were affected.

πŸ“– Read

via "National Vulnerability Database".
❌ Windows Hello Bypass Fools Biometrics Safeguards in PCs ❌

A Windows security bug would allow an attacker to fool a USB camera used in the biometric facial-recognition aspect of the system.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-25953 β€Ό

Prototype pollution vulnerability in 'putil-merge' versions1.0.0 through 3.6.6 allows attacker to cause a denial of service and may lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
❌ Updated Joker Malware Floods into Android Apps ❌

The Joker premium billing-fraud malware is back on Google Play in a fresh onslaught, with an updated bag of tricks to evade scanners.

πŸ“– Read

via "Threat Post".
πŸ” NYDFS Issues Ransomware Prevention Guidance for Financial Services Firms πŸ”

The NYDFS has issued guidance for financial services companies on how to reduce the risk of ransomware attacks - like having a capable endpoint threat detection and response (EDR) solution in place.

πŸ“– Read

via "".
β€Ό CVE-2021-33676 β€Ό

A missing authority check in SAP CRM, versions - 700, 701, 702, 712, 713, 714, could be leveraged by an attacker with high privileges to compromise confidentiality, integrity, or availability of the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33683 β€Ό

SAP Web Dispatcher and Internet Communication Manager (ICM), versions - KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.73, WEBDISP 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, KERNEL 7.21, 7.22, 7.49, 7.53, 7.73, 7.77, 7.81, 7.82, 7.83, process invalid HTTP header. The incorrect handling of the invalid Transfer-Encoding header in a particular manner leads to a possibility of HTTP Request Smuggling attack. An attacker could exploit this vulnerability to bypass web application firewall protection, divert sensitive data such as customer requests, session credentials, etc.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 4 Integrated Circuit Security Threats and How to Protect Against Them πŸ•΄

Little-understood threats involving the IC supply chain are putting organizations around the world at risk.

πŸ“– Read

via "Dark Reading".
🦿 These states saw the most hacks in 2020 🦿

A report uses FBI data to parse out state-by-state hacking data by the number of victims and total financial losses for every 100,000 residents.

πŸ“– Read

via "Tech Republic".
πŸ›  UFONet 1.7 πŸ› 

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multi-threading, proxies, origin spoofing methods, cache evasion techniques, etc.

πŸ“– Read

via "Packet Storm Security".
🦿 Personal data compromises up 38%, according to new cybersecurity report 🦿

The report parses out data by industry. Overall, healthcare topped the list, followed by financial services and manufacturing and utilities.

πŸ“– Read

via "Tech Republic".
⚠ Home delivery scams get smarter – don’t get caught out ⚠

We've said it before, and we'll say it again: don't be in too much of a hurry for those home deliveries you're expecting!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-33211 β€Ό

A Directory Traversal vulnerability in the Unzip feature in Elements-IT HTTP Commander 5.3.3 allows remote authenticated users to write files to arbitrary directories via relative paths in ZIP archives.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22781 β€Ό

Insufficiently Protected Credentials vulnerability exists in EcoStruxure Control Expert (all versions prior to V15.0 SP1, including all versions of Unity Pro), EcoStruxure Process Expert (all versions, including all versions of EcoStruxure Hybrid DCS), and SCADAPack RemoteConnect for x70, all versions, that could cause a leak of SMTP credential used for mailbox authentication when an attacker can access a project file.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 10 Mistakes Companies Make In Their Ransomware Responses πŸ•΄

Hit by ransomware? These missteps can take a bad scenario and make it even worse.

πŸ“– Read

via "Dark Reading".
❌ Trickbot Malware Rebounds with Virtual-Desktop Espionage Module ❌

The attackers have spruced up the 'vncDll' module used for spying on targets and stealing data.

πŸ“– Read

via "Threat Post".
🦿 IoT projects demand new skills from IT project managers 🦿

If you think regular IT project managers can run IoT projects, you might be miscalculating. Here's why.

πŸ“– Read

via "Tech Republic".