πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 75K Email Inboxes Hit in New Credential Phishing Campaign πŸ•΄

Attacker used a legitimate β€” but likely deprecated β€” domain to sneak malicious emails past security filters, vendor says.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-20122 β€Ό

Wuzhi CMS v4.1 contains a SQL injection vulnerability in the checktitle() function in /coreframe/app/content/admin/content.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20124 β€Ό

Wuzhi CMS v4.1.0 contains a remote code execution (RCE) vulnerability in \attachment\admin\index.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20120 β€Ό

ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20125 β€Ό

EARCLINK ESPCMS-P8 contains a cross-site scripting (XSS) vulnerability in espcms_web\espcms_load.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ What makes a password secure? πŸ“’

IT security is constantly evolving to counter threats, but the password remains a key part of our security arsenal

πŸ“– Read

via "ITPro".
πŸ“’ Amazon to offer cyber insurance to UK SMBs πŸ“’

The insurance will cover risks such as accidental privacy breaches, extortion and ransomware

πŸ“– Read

via "ITPro".
πŸ“’ Women and BAME individuals are hardest hit by cyber crime πŸ“’

Malwarebytes calls on the technology industry to do more to provide secure internet access to everyone

πŸ“– Read

via "ITPro".
πŸ“’ UK’s next National Cyber Strategy to reflect need for security industrial base πŸ“’

The country’s upcoming National Cyber Security Strategy will 'hopefully' be released later this year

πŸ“– Read

via "ITPro".
πŸ“’ Hackers spoof Zix in credential phishing attack πŸ“’

The attack has impacted around 75,000 Office 365, Google Workspace and Exchange users

πŸ“– Read

via "ITPro".
πŸ“’ Large companies fall short on domain security πŸ“’

Most large businesses still need to implement enterprise-level controls

πŸ“– Read

via "ITPro".
β€Ό CVE-2021-32466 β€Ό

An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35028 β€Ό

A command injection vulnerability in the CGI program of the Zyxel VPN2S firmware version 1.12 could allow an authenticated, local user to execute arbitrary OS commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36745 β€Ό

A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33923 β€Ό

Insecure permissions in Confluent Ansible (cp-ansible) 5.5.0, 5.5.1, 5.5.2 and 6.0.0 allows local attackers to access some sensitive information (private keys, state database).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33924 β€Ό

Confluent Ansible (cp-ansible) version 5.5.0, 5.5.1, 5.5.2 and 6.0.0 is vulnerable to Incorrect Access Control via its auxiliary component that allows remote attackers to access sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35027 β€Ό

A directory traversal vulnerability in the web server of the Zyxel VPN2S firmware version 1.12 could allow a remote attacker to gain access to sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ The Rise of One-Time Password Interception Bots β™ŸοΈ

In February, KrebsOnSecurity wrote about a novel cybercrime service that helped attackers intercept the one-time passwords (OTPs) that many websites require as a second authentication factor in addition to passwords. That service quickly went offline, but new research reveals a number of competitors have since launched bot-based services that make it relatively easy for crooks to phish OTPs from targets.

πŸ“– Read

via "Krebs on Security".
🦿 Top 5 tips for using password managers 🦿

Password managers are a good way to keep your passwords unique, strong and safe. Tom Merritt gives us five tips on how to use them correctly.

πŸ“– Read

via "Tech Republic".
🦿 How to use password managers: 5 tips 🦿

Tom Merritt gives tips for staying safe with password managers.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ What does the future hold for browser security? Check out the latest features destined for mobile and desktop πŸ—“οΈ

A rundown of leading web browsers’ privacy and security features – both in place and in the pipeline

πŸ“– Read

via "The Daily Swig".