🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2021-31216

Siren Investigate before 11.1.1 contains a server side request forgery (SSRF) defect in the built-in image proxy route (which is enabled by default). An attacker with access to the Investigate installation can specify an arbitrary URL in the parameters of the image proxy route and fetch external URLs as the Investigate process on the host.

📖 Read

via "National Vulnerability Database".
🛠 American Fuzzy Lop plus plus 3.14c 🛠

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

📖 Read

via "Packet Storm Security".
🛠 Hashcat Advanced Password Recovery 6.2.3 Source Code 🛠

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.

📖 Read

via "Packet Storm Security".
Leaked NSO Group Data Hints at Widespread Pegasus Spyware Infections

The secretive Israeli firm was allegedly storing 50,000+ mobile phone numbers for activists, journalists, business executives and politicians -- possible targets of iPhone and Android hacking.

📖 Read

via "Threat Post".
CVE-2021-34817

A Cross-Site Scripting (XSS) issue in the chat component of Etherpad 1.8.13 allows remote attackers to inject arbitrary JavaScript or HTML by importing a crafted pad.

📖 Read

via "National Vulnerability Database".
CVE-2021-32014

SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (CPU consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js.

📖 Read

via "National Vulnerability Database".
🕴 When Ransomware Comes to (Your) Town 🕴

While steps for defending against a ransomware attack vary based on the size of the government entity and the resources available to each one, rooting out ransomware ultimately will come down to two things: system architecture and partnerships.

📖 Read

via "Dark Reading".
Protecting Phones From Pegasus-Like Spyware Attacks

Podcast: Can a new SIM card and prepaid service from an MVNO help? Former spyware insider, current mobile white hat hacker Adam Weinberg on how to block spyware attacks.

📖 Read

via "Threat Post".
CVE-2020-36423

An issue was discovered in Arm Mbed TLS before 2.23.0. A remote attacker can recover plaintext because a certain Lucky 13 countermeasure doesn't properly consider the case of a hardware accelerator.

📖 Read

via "National Vulnerability Database".
CVE-2021-29707

IBM HMC (Hardware Management Console) V9.1.910.0 and V9.2.950.0 could allow a local user to escalate their privileges to root access on a restricted shell. IBM X-Force ID: 200879.

📖 Read

via "National Vulnerability Database".
🦿 US and allies finger China in Microsoft Exchange hack 🦿

The US has also blamed hackers working with China for ransomware attacks, extortion, crypto-jacking and other cybercrimes.

📖 Read

via "Tech Republic".
Ruthless Attackers Target Florida Condo Collapse Victims

Hackers are stealing the identities of those lost in the condo-collapse tragedy.

📖 Read

via "Threat Post".
🕴 NSO Group Spyware Used On Journalists & Activists Worldwide 🕴

An investigation finds Pegasus spyware, intended for use on criminals and terrorists, has been used in targeted campaigns against others around the world.

📖 Read

via "Dark Reading".
🔏 What is HITECH Compliance? Understanding and Meeting HITECH Requirements 🔏

Learn about the requirements for HITECH compliance and how to meet them in Data Protection 101, our series on the fundamentals of information security.

📖 Read

via "".
CVE-2020-20248

Mikrotik RouterOs before stable 6.47 suffers from an uncontrolled resource consumption in the memtest process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU.

📖 Read

via "National Vulnerability Database".
🕴 How Gaming Attack Data Aids Defenders Across Industries 🕴

Web application attacks against the video game industry quadrupled in 2020 compared to the previous year, but companies outside entertainment can learn from the data.

📖 Read

via "Dark Reading".
🕴 US Accuses China of Using Criminal Hackers in Cyber Espionage Operations 🕴

DOJ indicts four Chinese individuals for alleged role in attacks targeting intellectual property, trade secrets belonging to defense contractors, maritime companies, aircraft service firms, and others.

📖 Read

via "Dark Reading".
🦿 How to activate virtualization-based security and core isolation in Windows 10 🦿

Give your PC a little extra security. HVCI and VBS are available in 64-bit versions of Windows 10, but you must turn them on manually. We show you how.

📖 Read

via "Tech Republic".
Unpatched iPhone Bug Allows Remote Device Takeover

A format-string bug believed to be a low-risk denial-of-service issue turns out to be much nastier than expected.

📖 Read

via "Threat Post".
🕴 Law Firm for Ford, Pfizer, Exxon Discloses Ransomware Attack 🕴

Campbell Conroy & O'Neil reports the attack affected personal data including Social Security numbers, passport numbers, and payment card data for some individuals.

📖 Read

via "Dark Reading".
CVE-2021-34618

A remote denial of service (DoS) vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.4.x: All versions; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.

📖 Read

via "National Vulnerability Database".