πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Ransomware attackers are growing bolder and using new extortion methods 🦿

IT and OT environments are increasing targets and threat actors are using Dark Web forums to launch cybercrimes, according to Accenture's 2021 Cyber Threat Intelligence report.

πŸ“– Read

via "Tech Republic".
πŸ›  Wireshark Analyzer 3.4.7 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ What to Look for in an Effective Threat Hunter πŸ•΄

The most important personality traits, skills, and certifications to look for when hiring a threat hunting team.

πŸ“– Read

via "Dark Reading".
❌ SonicWall Warns Firewall Hardware Bugs Under Attack ❌

SonicWall issued an urgent security alert warning customers that some of its current and legacy firewall appliances were under active attack.

πŸ“– Read

via "Threat Post".
πŸ” An Interview with Adam Burns, Manager of Cybersecurity Analysts at Digital Guardian Part I πŸ”

In part one of our Q&A with Adam Burns, we discuss his background in security, ransomware in the news, and what traits make for a successful analyst.

πŸ“– Read

via "".
β€Ό CVE-2020-12731 β€Ό

The MagicMotion Flamingo 2 application for Android stores data on an sdcard under com.vt.magicmotion/files/Pictures, whence it can be read by other applications.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25593 β€Ό

Acronis True Image through 2021 on macOS allows local privilege escalation from admin to root due to insecure folder permissions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34691 β€Ό

iDrive RemotePC before 4.0.1 on Linux allows denial of service. A remote and unauthenticated attacker can disconnect a valid user session by connecting to an ephemeral port.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to add the mic and camera killswitches in Android 12 🦿

Android 12 adds killswitches for both the mic and camera. Jack Wallen shows you how to add them and use them.

πŸ“– Read

via "Tech Republic".
⚠ The Code Red worm 20 years on – what have we learned? ⚠

"It was 20 years ago today..." that we learned a few lessons that are well worth revisiting!

πŸ“– Read

via "Naked Security".
πŸ•΄ How to Bridge On-Premises and Cloud Identity πŸ•΄

Identity fabric, a cloud-native framework, removes the need for multiple, siloed, proprietary identity systems.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-34429 β€Ό

For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21586 β€Ό

Wyse Management Suite versions 3.2 and earlier contain an absolute path traversal vulnerability. A remote authenticated malicious user could exploit this vulnerability in order to read arbitrary files on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3042 β€Ό

A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. Exploiting this vulnerability requires the user to have file creation privilege in the Windows root directory (such as C:\). This issue impacts: All versions of Cortex XDR agent 6.1 without content update 181 or a later version; All versions of Cortex XDR agent 7.2 without content update 181 or a later version; All versions of Cortex XDR agent 7.3 without content update 181 or a later version. Cortex XDR agent 5.0 versions are not impacted by this issue. Content updates are required to resolve this issue and are automatically applied for the agent.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ IoT-Specific Malware Infections Jumped 700% Amid Pandemic πŸ•΄

Gafgyt and Mirai malware represented majority of IoT malware, new data from Zscaler shows.

πŸ“– Read

via "Dark Reading".
🦿 Cisco Talos researchers find crypto mining detections have doubled in the last year 🦿

Security experts recommend looking for increased activity from illicit mining on corporate networks when cryptocurrency prices go up.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-34830 β€Ό

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1.13B01 BETA routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the Cookie HTTP header. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-12028.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20496 β€Ό

IBM Security Verify Access Docker 10.0.0 could allow an authenticated user to bypass input due to improper input validation. IBM X-Force ID: 197966.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ CISA Launches New Website to Aid Ransomware Defenders πŸ•΄

StopRansomware.gov provides information to help organizations protect against, and respond to, ransomware attacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft: Israeli Firm's Tools Used to Target Activists, Dissidents πŸ•΄

Candiru sold spyware that exploited Windows vulnerabilities and had been used in attacks against dissidents, activists, and journalists.

πŸ“– Read

via "Dark Reading".
❌ Zero-Day Attacks on Critical WooCommerce Bug Threaten Databases ❌

The popular e-commerce platform for WordPress has started deploying emergency patches.

πŸ“– Read

via "Threat Post".