πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ What does the future hold for browser security? Check out the latest features destined for mobile and desktop πŸ—“οΈ

A rundown of leading web browsers’ privacy and security features – both in place and in the pipeline

πŸ“– Read

via "The Daily Swig".
❌ Threat Actors Weaponize Telegram Bots to Compromise PayPal Accounts ❌

A campaign is stealing one-time password tokens to gain access to PayPal, Apple Pay and Google Pay, among others.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Navistar confirms data breach involved employee healthcare information πŸ—“οΈ

US truck manufacturer breaks bad news to employees and retired workers

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Sneaky Android Trojan Siphons Millions Using Premium SMS πŸ•΄

More than 200 applications on the Google Play store have, until recently, allowed cybercriminals to deliver malicious Web content to victims' phones, likely garnering tens of millions of dollars.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 3 Security Initiatives AWS's New CEO Should Prioritize πŸ•΄

As Adam Selipsky takes the helm at Amazon Web Services, security must be one of the first things he addresses. Here are three initiatives that should take priority.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-40651 β€Ό

OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Google Tsunami Security Scanner Pre-Alpha πŸ› 

Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. It was originally written by Google and open sourced in July of 2020.

πŸ“– Read

via "Packet Storm Security".
❌ SAS 2021: β€˜Tomiris’ Backdoor Linked to SolarWinds Malware ❌

Newly discovered code resembles the Kazuar backdoor and the Sunshuttle second-stage malware distributed by Nobelium in the SolarWinds supply-chain attacks.

πŸ“– Read

via "Threat Post".
πŸ•΄ Why Should I Care About HTTP Request Smuggling? πŸ•΄

HTTP request smuggling is a growing vulnerability, but you can manage the risk with proper server configuration.

πŸ“– Read

via "Dark Reading".
πŸ•΄ DAST to the Future: Shifting the Modern AppSec Paradigm πŸ•΄

NTT Application Security's Modern AppSec Framework takes a DAST-first approach to defend applications where breaches happen β€” in production.

πŸ“– Read

via "Dark Reading".
❌ Conti Ransomware Expands Ability to Blow Up Backups ❌

The Conti ransomware gang has developed novel tactics to demolish backups, especially the Veeam recovery software.

πŸ“– Read

via "Threat Post".
🦿 How people concoct their passwords, and why they often stink 🦿

Less than a third of the people surveyed by NordPass follow best practices when devising a password.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Russian Officials Arrest Group-IB CEO, Accuse Him of Treason πŸ•΄

Ilya Sachkov, founder and CEO of the massive cybersecurity firm, was arrested on treason charges and will be in custody for two months.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-25961 β€Ό

In Ò€œSuiteCRMҀ� application, v7.1.7 through v7.10.31 and v7.11-beta through v7.11.20 fail to properly invalidate password reset links that is associated with a deleted user id, which makes it possible for account takeover of any newly created user with the same user id.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25960 β€Ό

In Ò€œSuiteCRMҀ� application, v7.11.18 through v7.11.19 and v7.10.29 through v7.10.31 are affected by Ò€œCSV InjectionҀ� vulnerability (Formula Injection). A low privileged attacker can use accounts module to inject payloads in the input fields. When an administrator access accounts module to export the data as a CSV file and opens it, the payload gets executed. This was not fixed properly as part of CVE-2020-15301, allowing the attacker to bypass the security measure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25959 β€Ό

In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25962 β€Ό

Ò€œShuupҀ� application in versions 0.4.2 to 2.10.8 is affected by the Ò€œFormula InjectionҀ� vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.

πŸ“– Read

via "National Vulnerability Database".
🦿 Ping Identity buys Singular Key and promises smoother ID verification and access management 🦿

The purchase of Singular Key will add to Ping's identity and access management service with a no-code method of creating workflows for identity verification for enterprises.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Cyberspace, Cybergames, and Cyberspies πŸ•΄

How cyberspace has become a global cybergames stage, where all of us are actors.

πŸ“– Read

via "Dark Reading".
❌ GriftHorse Money-Stealing Trojan Takes 10M Android Users for a Ride ❌

The mobile malware has fleeced hundreds of millions of dollars from victims globally, using sophisticated techniques.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-29834 β€Ό

IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3,20.0.0.1, 20.0.0.2, and 21.0.2 and IBM Business Process Manager 8.5 and 8.6 are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204832.

πŸ“– Read

via "National Vulnerability Database".