πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Phony vaccine card prices double following Biden mandate announcement 🦿

Dark Web prices for fake vaccination cards shot up from $100 to $200 almost immediately after the president announced new mandates, says Check Point Research.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-22526 β€Ό

Open Redirection vulnerability in NetIQ Access Manager prior to 5.0.1 and 4.5.4

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32136 β€Ό

Heap buffer overflow in the print_udta function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27969 β€Ό

Yandex Browser for Android 20.8.4 allows remote attackers to perform SOP bypass and addresss bar spoofing

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22527 β€Ό

Information leakage vulnerability in NetIQ Access Manager prior to 5.0.1 and 4.5.4

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22524 β€Ό

Injection attack caused the denial of service vulnerability in NetIQ Access Manager prior to 5.0.1 and 4.5.4

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22528 β€Ό

Reflected Cross Site Scripting (XSS) vulnerability in NetIQ Access Manager prior to 5.0.1 and 4.5.4

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40214 β€Ό

Gibbon v22.0.00 suffers from a stored XSS vulnerability within the wall messages component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27970 β€Ό

Yandex Browser before 20.10.0 allows remote attackers to spoof the address bar

πŸ“– Read

via "National Vulnerability Database".
🦿 Protect your endpoints with top EDR software 🦿

Endpoint detection and response (EDR) software detects and identifies threats on network-connected devices. Compare features of top EDR tools.

πŸ“– Read

via "Tech Republic".
🦿 5 ways to better prepare your organization for a ransomware attack 🦿

Most executives cite ransomware as their biggest security concern but few have run simulated attacks to prepare, says Deloitte.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Fraudster handed 11-year prison term for role in North Korean cybercrime operation πŸ—“οΈ

Defendant ordered to pay $30m in restitution to victims

πŸ“– Read

via "The Daily Swig".
🦿 How to use mkcert to create locally signed SSL certificates 🦿

Jack Wallen shows you how to use mkcert. If you need to generate quick SSL certificates for test servers and services, this might be the fastest option available.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-29643 β€Ό

PRTG Network Monitor before 21.3.69.1333 allows stored XSS via an unsanitized string imported from a User Object in a connected Active Directory instance.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32137 β€Ό

Heap buffer overflow in the URL_GetProtocolType function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32132 β€Ό

The abst_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32134 β€Ό

The gf_odf_desc_copy function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32135 β€Ό

The trak_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.

πŸ“– Read

via "National Vulnerability Database".
⚠ Serious Security: How to make sure you don’t miss bug reports! ⚠

Hey, let's create a text file that lists our security contacts! We'll call it... security DOT txt.

πŸ“– Read

via "Naked Security".
⚠ S3 Ep49: Poison PACs, pointless alarms and phunky bugs [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
🦿 IoT device attacks double in the first half of 2021, and remote work may shoulder some of the blame 🦿

The smart home could be ripe for IoT device attacks as cybercriminals rake in record ransomware payments. Remote work may be responsible for the increase in attacks, Kaspersky says.

πŸ“– Read

via "Tech Republic".