πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ How Psychology Can Save Your Cybersecurity Awareness Training Program πŸ•΄

Understanding human psychology, how it works, and how to introduce its concepts into cybersecurity awareness training can make a huge difference to your organization.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-35512 β€Ό

An SSRF issue was discovered in Zoho ManageEngine Applications Manager build 15200.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ New bug bounty platform launches for Indian ethical hackers πŸ—“οΈ

Security researchers can sign up now

πŸ“– Read

via "The Daily Swig".
🦿 How to digitally sign email in Apple Mail 🦿

Adding a digital signature to your email is just one simple step you can take in your journey for more secure communications. Jack Wallen shows you how this is done in the latest version of Apple Mail.

πŸ“– Read

via "Tech Republic".
πŸ›  AntiRansom 5 πŸ› 

AntiRansom is a tool capable of detecting and mitigating attacks of Ransomware using honeypots.

πŸ“– Read

via "Packet Storm Security".
⚠ S3 Ep55: Live malware, global encryption, dating scams, and secret emanations [Podcasts] ⚠

Latest episode - listen now! (And sign up for our forthcoming Live Malware Demo at the same time.)

πŸ“– Read

via "Naked Security".
πŸ•΄ Macs Still Targeted Mostly With Adware, Less With Malware πŸ•΄

The top 10 categories of digital threats on macOS are all adware programs, with only a sliver of the share of victims affected by actual malware, according to an IT management firm.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-42740 β€Ό

The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character.

πŸ“– Read

via "National Vulnerability Database".
❌ Gigabyte Allegedly Hit by AvosLocker Ransomware ❌

If AvosLocker stole Gigabyte's master keys, threat actors could force hardware to download fake drivers or BIOS updates in a supply-chain attack a la SolarWinds.

πŸ“– Read

via "Threat Post".
πŸ•΄ Microsoft Launches Security Program for Nonprofits πŸ•΄

A new set of security tools is built to assess risk, provide monitoring and notification if an attack occurs, and train IT pros and users.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-28975 β€Ό

WP Mailster 1.6.18.0 allows XSS when a victim opens a mail server's details in the mst_servers page, for a crafted server_host, server_name, or connection_parameter parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20120 β€Ό

The administration web interface for the Arris Surfboard SB8200 lacks any protections against cross-site request forgery attacks. This means that an attacker could make configuration changes (such as changing the administrative password) without the consent of the user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29883 β€Ό

IBM Standards Processing Engine (IBM Transformation Extender Advanced 9.0 and 10.0) does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 207090.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27304 β€Ό

The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-14263 β€Ό

"HCL Traveler Companion is vulnerable to an iOS weak cryptographic process vulnerability via the included MobileIron AppConnect SDK"

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29873 β€Ό

IBM Flash System 900 could allow an authenticated attacker to obtain sensitive information and cause a denial of service due to a restricted shell escape vulnerability. IBM X-Force ID: 206229.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28496 β€Ό

On systems running Arista EOS and CloudEOS with the affected release version, when using shared secret profiles the password configured for use by BiDirectional Forwarding Detection (BFD) will be leaked when displaying output over eAPI or other JSON outputs to other authenticated users on the device. The affected EOS Versions are: all releases in 4.22.x train, 4.23.9 and below releases in the 4.23.x train, 4.24.7 and below releases in the 4.24.x train, 4.25.4 and below releases in the 4.25.x train, 4.26.1 and below releases in the 4.26.x train

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42327 β€Ό

dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.

πŸ“– Read

via "National Vulnerability Database".
πŸ” US Treasury Outlines Compliance Best Practices for Cryptocurrency Companies πŸ”

The newly released guide is designed to emphasize sanctions compliance requirements amid the US government’s efforts to combat ransomware.

πŸ“– Read

via "".
πŸ•΄ Why Should My Organization Consider XDR? πŸ•΄

XDR is a newish industry term addressing a very old problem: security products that don't work together to detect threats.

πŸ“– Read

via "Dark Reading".
❌ TA551 Shifts Tactics to Install Sliver Red-Teaming Tool ❌

A new email campaign from the threat group uses the attack-simulation framework in a likely leadup to ransomware deployment.

πŸ“– Read

via "Threat Post".