πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-42665 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the login form inside of index.php, which can allow an attacker to bypass authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42670 β€Ό

A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to the announcements_student.php web page. As a result a malicious user can extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.

πŸ“– Read

via "National Vulnerability Database".
🦿 Voice phishing attack spoofs Amazon to steal credit card information 🦿

Impersonating an Amazon order notification, the attackers end up calling victims to try to obtain their credit card details, says Avanan.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Cisco patches critical bug trio in Policy Suite and ONT networking devices πŸ—“οΈ

Critical severity bugs disclosed by networking titan

πŸ“– Read

via "The Daily Swig".
❌ Proofpoint Phish Harvests Microsoft O365, Google Logins ❌

A savvy campaign impersonating the cybersecurity company skated past Microsoft email security.

πŸ“– Read

via "Threat Post".
πŸ•΄ To Secure DevOps, Security Teams Must be Agile πŸ•΄

The evolution of agile development and infrastructure-as-code has given security teams the tools they need to gain visibility, find vulnerabilities early, and continuously evaluate infrastructure.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Lessons learned: How a severe vulnerability in the OWASP ModSecurity Core Rule Set sparked much-needed change πŸ—“οΈ

Years-old WAF bypass flaw was discovered in June

πŸ“– Read

via "The Daily Swig".
❌ Google Ads for Faux Cryptowallets Net Scammers At Least $500K ❌

Malicious Phantom, MetaMask cryptowallets are on the prowl to drain victim funds. 

πŸ“– Read

via "Threat Post".
🦿 US government unveils $10 million bounty for DarkSide ransomware gang leaders 🦿

The $10 million is for intel that leads to the identification or location of anyone who holds a leadership position in the DarkSide group.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-3924 β€Ό

grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3928 β€Ό

vim is vulnerable to Stack-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3916 β€Ό

bookstack is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39412 β€Ό

Multiple Cross Site Scripting (XSS) vulnerabilities exists in PHPGurukul Shopping v3.1 via the (1) callback parameter in (a) server_side/scripts/id_jsonp.php, (b) server_side/scripts/jsonp.php, and (c) scripts/objects_jsonp.php, the (2) value parameter in examples_support/editable_ajax.php, and the (3) PHP_SELF parameter in captcha/index.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3927 β€Ό

vim is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39411 β€Ό

Multiple Cross Site Scripting (XSS) vulnerabilities exist in PHPGurukul Hospital Management System 4.0 via the (1) searchdata parameter in (a) doctor/search.php and (b) admin/patient-search.php, and the (2) fromdate and (3) todate parameters in admin/betweendates-detailsreports.php.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Faraday 3.18.1 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
❌ Beyond the Basics: Tips for Building Advanced Ransomware Resiliency ❌

Joseph Carson, chief security scientist and advisory CISO at ThycoticCentrify, offers advice on least privilege, automation, application control and more.

πŸ“– Read

via "Threat Post".
❌ BrakTooth Bluetooth Bugs Bite: Exploit Code, PoC Released ❌

CISA is urging vendors to patch, given the release of public exploit code & a proof of concept tool for bugs that open billions of devices – phones, PCs, toys, etc. – to DoS & code execution.

πŸ“– Read

via "Threat Post".
πŸ” Friday Five 11/5 πŸ”

The U.S. blacklists four companies for malicious cyber activities, a ransomware group shuts down, and a new CMMC program gets revamped - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
⚠ β€œCustomer complaint” email scam preys on your fear of getting into trouble at work ⚠

Stop. Think. Connect. Don't let the crooks trick you into acting in haste.

πŸ“– Read

via "Naked Security".
⚠ S3 Ep57: Europol v. Ransomware, Shrootless bug, and Linux browser flamewars [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".