πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Microsoft Fends Off 2.4 Tbps DDoS Attack πŸ”

The attack was reportedly 140 percent higher than a 1 Tbps attack it saw in 2020 and higher than any network volumetric event the company previously detected.

πŸ“– Read

via "".
πŸ•΄ Are You Ready for the Privacy Laws Tsunami? πŸ•΄

Think PCI, HIPAA, and GDPR compliance is tough? There's a tsunami of similar laws on the way. Prepare your business for success with privacy by design.

πŸ“– Read

via "Dark Reading".
❌ FreakOut Botnet Turns DVRs Into Monero Cryptominers ❌

The new Necro Python exploit targets Visual Tool DVRs used in surveillance systems.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-42224 β€Ό

SQL Injection vulnerability exists in IFSC Code Finder Project 1.0 via the searchifsccode POST parameter in /search.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26318 β€Ό

A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20130 β€Ό

ManageEngine ADManager Plus Build 7111 contains a post-authentication remote code execution vulnerability due to improperly validated file uploads in the PasswordExpiry interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20131 β€Ό

ManageEngine ADManager Plus Build 7111 contains a post-authentication remote code execution vulnerability due to improperly validated file uploads in the Personalization interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40842 β€Ό

Proofpoint Insider Threat Management Server contains a SQL injection vulnerability in the Web Console. The vulnerability exists due to improper input validation on the database name parameter required in certain unauthenticated APIs. A malicious URL visited by anyone with network access to the server could be used to blindly execute arbitrary SQL statements on the backend database. Version 7.12.0 and all versions prior to 7.11.2 are affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40843 β€Ό

Proofpoint Insider Threat Management Server contains an unsafe deserialization vulnerability in the Web Console. An attacker with write access to the local database could cause arbitrary code to execute with SYSTEM privileges on the underlying server when a Web Console user triggers retrieval of that data. When chained with a SQL injection vulnerability, the vulnerability could be exploited remotely if Web Console users click a series of maliciously crafted URLs. All versions prior to 7.11.2 are affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42223 β€Ό

Cross Site Scripting (XSS).vulnerability exists in Online DJ Booking Management System 1.0 in view-booking-detail.php.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to get the most bang for your buck out of your cybersecurity budget 🦿

More than a quarter of executives surveyed by PwC expect double-digit growth in security budgets in 2022. The trick is to spend that money wisely and effectively.

πŸ“– Read

via "Tech Republic".
πŸ•΄ What Does a Chief Product Security Officer Do? πŸ•΄

A CPSO bridges the gap between developers and security to ensure products are built securely and safely.

πŸ“– Read

via "Dark Reading".
πŸ•΄ VirusTotal Shares Data on Ransomware Activity πŸ•΄

Google's online malware scanning service analyzed 80 million ransomware samples that were uploaded in the past year-and-a-half.

πŸ“– Read

via "Dark Reading".
🦿 3 risk management priorities CIOs are focused on right now 🦿

CIOs have had their hands full since the start of the pandemic with three risk management and governance priorities weighing heavily on their minds.

πŸ“– Read

via "Tech Republic".
🦿 Has COVID-19 or supply chain issues affected your organization's cybersecurity plans? 🦿

What do you really think about your company's cybersecurity strategy? Take this quick, multiple choice survey and tell us.

πŸ“– Read

via "Tech Republic".
πŸ•΄ SonicWall Secures Mix of Cloud, Hybrid and Traditional Networks πŸ•΄

Company’s virtual offerings, cloud services match with on-premises deployments to solve real-world security challenges for SMBs, enterprises, governments, and MSSPs.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Fugue Adds Kubernetes Security Checks to Secure Infrastructure-As-Code πŸ•΄

Developers can apply proper security controls as they programmatically deploy Kubernetes clusters.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-41075 β€Ό

The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40493 β€Ό

Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42341 β€Ό

checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3882 β€Ό

LedgerSMB does not set the 'Secure' attribute on the session authorization cookie when the client uses HTTPS and the LedgerSMB server is behind a reverse proxy. By tricking a user to use an unencrypted connection (HTTP), an attacker may be able to obtain the authentication data by capturing network traffic. LedgerSMB 1.8 and newer switched from Basic authentication to using cookie authentication with encrypted cookies. Although an attacker can't access the information inside the cookie, nor the password of the user, possession of the cookie is enough to access the application as the user from which the cookie has been obtained. In order for the attacker to obtain the cookie, first of all the server must be configured to respond to unencrypted requests, the attacker must be suitably positioned to eavesdrop on the network traffic between the client and the server *and* the user must be tricked into using unencrypted HTTP traffic. Proper audit control and separation of duties limit Integrity impact of the attack vector. Users of LedgerSMB 1.8 are urged to upgrade to known-fixed versions. Users of LedgerSMB 1.7 or 1.9 are unaffected by this vulnerability and don't need to take action. As a workaround, users may configure their Apache or Nginx reverse proxy to add the Secure attribute at the network boundary instead of relying on LedgerSMB. For Apache, please refer to the 'Header always edit' configuration command in the mod_headers module. For Nginx, please refer to the 'proxy_cookie_flags' configuration command.

πŸ“– Read

via "National Vulnerability Database".