πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-31923 β€Ό

Ping Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41583 β€Ό

vpn-user-portal (aka eduVPN or Let's Connect!) before 2.3.14, as packaged for Debian 10, Debian 11, and Fedora, allows remote authenticated users to obtain OS filesystem access, because of the interaction of QR codes with an exec that uses the -r option. This can be leveraged to obtain additional VPN access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41581 β€Ό

x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.

πŸ“– Read

via "National Vulnerability Database".
❌ Apple Patches 3 More Zero-Days Under Active Attack ❌

One of the bugs, which affects macOS as well as older versions of iPhones, could allow an attacker to execute arbitrary code with kernel privileges.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Millions of South Africans caught up in security incident after debt recovery firm suffers β€˜significant data breach’ πŸ—“οΈ

Sensitive information is among datasets potentially exposed

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-36749 β€Ό

In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Primer: Microsoft Active Directory Security for AD Admins πŸ•΄

Nearly all AD environments are vulnerable to identity attack paths -- a powerful, widespread, and difficult-to-detect attack technique. But we didn't say impossible. Here's how admins can stop them.

πŸ“– Read

via "Dark Reading".
πŸ•΄ BlackFog ARM 64 Edition Provides Anti Data Exfiltration Across New Patforms πŸ•΄

New BlackFog ARM 64 edition maximizes performance, battery life, and data security.

πŸ“– Read

via "Dark Reading".
πŸ•΄ NIST Brings Threat Modeling into the Spotlight πŸ•΄

NIST recommendations typically become part of government procurement, which means threat modeling will soon be written into questions for organizations that sell to the federal government.

πŸ“– Read

via "Dark Reading".
πŸ•΄ UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data πŸ•΄

The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.

πŸ“– Read

via "Dark Reading".
πŸ•΄ SAIC Appoints Kevin Brown as Chief Information Security Officer πŸ•΄

Industry leader with decades of information security experience manages SAIC’s security strategy and oversees critical cybersecurity operations.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How to Implement a Security Champions Program πŸ•΄

A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top of mind throughout the business.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft Exchange Autodiscover Flaw Leaks Thousands of Credentials πŸ•΄

Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol.

πŸ“– Read

via "Dark Reading".
πŸ•΄ FamousSparrow APT Group Flocks to Hotels, Governments, Businesses πŸ•΄

The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Supply Chain and Ransomware Threats Drove 60% Increase in Global Cyber Intelligence Sharing Among Financial Firms πŸ•΄

AMEX, Banco Falabella, IAG, and UBS win global award for annual cyber intelligence sharing efforts.

πŸ“– Read

via "Dark Reading".
πŸ•΄ A Cyber-Resilience Model for the Next Era πŸ•΄

Digital dilemmas have driven security to the forefront of business leaders' priorities. Understanding how to provide security at the speed of change and build a cyber-resilient organization will drive competitive advantage and help organizations run and transform with ease.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 6 Lessons From Major Data Breaches This Year πŸ•΄

Though many incidents stemmed from familiar security failures, they served up β€” or resurfaced β€” some important takeaways.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Panorays Closes $42 Million Series B Funding Round πŸ•΄

Funding comes on the heels of 500% growth in client base.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Apple Patches Zero-Days in iOS, Known Vuln in macOS πŸ•΄

One of the iOS vulnerabilities was discovered by Citizen Lab; the Google Threat Analysis Group reported iOS and macOS flaws.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Google Spots New Technique to Sneak Malware Past Detection Tools πŸ•΄

The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Password Reuse Problems Persist Despite Known Risks πŸ•΄

The vast majority of users worry about compromised passwords, but two-thirds continue to use the same password or a variation, a survey finds.

πŸ“– Read

via "Dark Reading".