πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ S3 Ep52: Let’s Encrypt, Outlook leak, and VMware exploit [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ›  Haveged 1.9.15 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Read

via "Packet Storm Security".
❌ Innovative Proxy Phantom ATO Fraud Ring Haunts eCommerce Accounts ❌

The group uses millions of password combos at the rate of nearly 2,700 login attempts per minute with new techniques that push the ATO envelope.

πŸ“– Read

via "Threat Post".
❌ Baby’s Death Alleged to Be Linked to Ransomware ❌

Access to heart monitors disabled by the attack allegedly kept staff from spotting blood & oxygen deprivation that led to the baby's death.

πŸ“– Read

via "Threat Post".
πŸ•΄ You're Going to Be the Victim of a Ransomware Attack πŸ•΄

That's not admitting defeat. It's preparing for success.

πŸ“– Read

via "Dark Reading".
❌ Tips & Tricks for Unmasking Ghoulish API Behavior ❌

Jason Kent, hacker-in-residence at Cequence Security, discusses how to track user-agent connections to mobile and desktop APIs, to spot malicious activity.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-29894 β€Ό

IBM Cloud Pak for Security (CP4S) 1.7.0.0, 1.7.1.0, 1.7.2.0, and 1.8.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 207320.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24016 β€Ό

An improper neutralization of formula elements in a csv file in Fortinet FortiManager version 6.4.3 and below, 6.2.7 and below allows attacker to execute arbitrary commands via crafted IPv4 field in policy name, when exported as excel file and opened unsafely on the victim host.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24017 β€Ό

An improper authentication in Fortinet FortiManager version 6.4.3 and below, 6.2.6 and below allows attacker to assign arbitrary Policy and Object modules via crafted requests to the request handler.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20662 β€Ό

libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_example1.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20664 β€Ό

libiec_iccp_mod v1.5 contains a segmentation violation in the component server_example1.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20663 β€Ό

libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_connection.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20578 β€Ό

IBM Cloud Pak for Security (CP4S) 1.7.0.0, 1.7.1.0, 1.7.2.0, and 1.8.0.0 could allow an attacker to perform unauthorized actions due to improper or missing authentication controls. IBM X-Force ID: 199282.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20554 β€Ό

IBM Sterling Order Management 9.4, 9.5, and 10.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199179.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20665 β€Ό

rudp v0.6 was discovered to contain a memory leak in the component main.c.

πŸ“– Read

via "National Vulnerability Database".
πŸ” CISA Rolls Out New Insider Threat Risk Assessment Tool πŸ”

The tool, which is intended for both public and private sector organizations, can help companies better assess their vulnerability to insider threats.

πŸ“– Read

via "".
🦿 Dell announces new ProSupport Suite and AI-powered Trusted Device capabilities 🦿

Both could help businesses struggling to secure remote workforces and protect ever-increasing vulnerability footprints.

πŸ“– Read

via "Tech Republic".
🦿 Windows Server 2022: A cheat sheet 🦿

Microsoft has just released its most recent Windows Server platform. Check out the improved hybrid cloud features, beefed up security and improved support for large on-premises applications.

πŸ“– Read

via "Tech Republic".
❌ Military’s RFID Tracking of Guns May Endanger Troops ❌

RFID gun tags leave the military exposed to tracking, sniffing and spoofing attacks, experts say.  

πŸ“– Read

via "Threat Post".
🦿 How to install the Nessus vulnerability scanner on Rocky Linux 🦿

If you're looking for one of the best vulnerability scanners on the market, Nessus might be the ticket. Jack Wallen shows you how to install this platform on Rocky Linux.

πŸ“– Read

via "Tech Republic".
πŸ•΄ FireEye Products & McAfee Enterprise Merge to Create $2B Entity πŸ•΄

The combined company will have 5,000 employees, more than 40,000 customers, and nearly $2 billion in revenue, officials report.

πŸ“– Read

via "Dark Reading".