🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
SpyFone & CEO Banned From Stalkerware Biz

The FTC's first spyware ban nixes a company whose "slipshod" security practices led to exposure of thousands of victims' illegally collected personal data.

📖 Read

via "Threat Post".
CVE-2020-18048

An issue in craigms/main.php of CraigMS 1.0 allows attackers to execute arbitrary commands via a crafted input entered into the DB Name field.

📖 Read

via "National Vulnerability Database".
NFT Collector Tricked into Buying Fake Banksy 

An attacker breached the site of famed street artist Banksy to host a fraudulent NFT auction but then gave back the money.

📖 Read

via "Threat Post".
CVE-2021-34436

In Eclipse Theia 0.1.1 to 0.2.0, it is possible to exploit the default build to obtain remote code execution (and XXE) via the theia-xml-extension. This extension uses lsp4xml (recently renamed to LemMinX) in order to provide language support for XML. This is installed by default.

📖 Read

via "National Vulnerability Database".
CVE-2021-38641

Microsoft Edge for Android Spoofing Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2021-38642

Microsoft Edge for iOS Spoofing Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2021-26439

Microsoft Edge for Android Information Disclosure Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2021-26436

Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36930.

📖 Read

via "National Vulnerability Database".
CVE-2021-36930

Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26436.

📖 Read

via "National Vulnerability Database".
Brute-Force Attacks Target Inboxes for Gift Card Data

Cybercriminal enterprise is mass testing millions of usernames and passwords per day in a hunt for loyalty card data.

📖 Read

via "Threat Post".
S3 Ep48: Cryptographic bugs, cryptocurrency nightmares, and lots of phishing [Podcast]

Latest episode - listen now!

📖 Read

via "Naked Security".
Pwned! The home security system that can be hacked with your email address

The alarm system that can be turned off with your email address.

📖 Read

via "Naked Security".
🔏 Friday Five 9/3 🔏

How not to get hacked, a $9 million ransomware attack, and the FTC cracks down on a spyware app - catch up on the infosec news of the week with the Friday Five!

📖 Read

via "".
🛠 Clam AntiVirus Toolkit 0.104.0 🛠

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

📖 Read

via "Packet Storm Security".
🛠 SQLMAP - Automatic SQL Injection Tool 1.5.9 🛠

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

📖 Read

via "Packet Storm Security".
🛠 nfstream 6.3.4 🛠

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

📖 Read

via "Packet Storm Security".
The State of Incident Response: Measuring Risk and Evaluating Your Preparedness

Grant Oviatt, director of incident-response engagements at Red Canary, provides advice and best practices on how to get there faster.

📖 Read

via "Threat Post".
FIN7 Capitalizes on Windows 11 Release in Latest Gambit

The financially motivated group looked to steal payment-card data from a California-based point-of-sale service provider.

📖 Read

via "Threat Post".
CVE-2021-39192

Ghost is a Node.js content management system. An error in the implementation of the limits service between versions 4.0.0 and 4.9.4 allows all authenticated users (including contributors) to view admin-level API keys via the integrations API endpoint, leading to a privilege escalation vulnerability. This issue is patched in Ghost version 4.10.0. As a workaround, disable all non-Administrator accounts to prevent API access. It is highly recommended to regenerate all API keys after patching or applying the workaround.

📖 Read

via "National Vulnerability Database".
CVE-2021-39191

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.

📖 Read

via "National Vulnerability Database".
🦿 How to install fail2ban on Rocky Linux and AlmaLinux 🦿

Fail2ban should be on every one of your Linux servers. If you've yet to install it on either Rocky Linux or AlmaLinux, Jack Wallen is here to help you out with that.

📖 Read

via "Tech Republic".