πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-25980 β€Ό

In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the Ò€œforgot passwordҀ� functionality to reset the victimÒ€ℒs password and successfully take over their account.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Should Our Security Controls Be More Like North Korea or Norway? πŸ•΄

When the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.

πŸ“– Read

via "Dark Reading".
❌ Tiny Font Size Fools Email Filters in BEC Phishing ❌

The One Font BEC campaign targets Microsoft 365 users and uses sophisticated obfuscation tactics to slip past security protections to harvest credentials.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Dependency Combobulator offers defense against namespace confusion attacks πŸ—“οΈ

Toolkit β€˜tackles common scenarios’ and can evolve to detect emerging attack variants

πŸ“– Read

via "The Daily Swig".
⚠ Patch Tuesday updates the Win 7 updater… for at most 1 more year of updates ⚠

The clock stopped long ago on Windows 7, except for those who paid for overtime. But there won't be any double overtime!

πŸ“– Read

via "Naked Security".
🦿 How cybercriminals use bait attacks to gather info about their intended victims 🦿

With a bait attack, criminals try to obtain the necessary details to plan future attacks against their targets, says Barracuda.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Palo Alto GlobalProtect users urged to patch against critical vulnerability πŸ—“οΈ

Details withheld about dangerous threat as orgs given one-month patching window

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-43350 β€Ό

An unauthenticated Apache Traffic Control Traffic Ops user can send a request with a specially-crafted username to the POST /login endpoint of any API version to inject unsanitized content into the LDAP filter.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Zero tolerance: How infosec’s online β€˜cancel culture’ is stunting industry growth πŸ—“οΈ

Fear of Twitter fallout is stopping vital information from being shared Social media backlash and online squabbling is stopping the information security industry from learning from its mistakes, Black

πŸ“– Read

via "The Daily Swig".
🦿 This pre-Black Friday sale lets you save an extra 15% off cybersecurity certification training courses 🦿

Receive over 100 hours of expert instruction on globally recognized cybersecurity skills that will help you become an in-demand IT professional.

πŸ“– Read

via "Tech Republic".
🦿 How to easily transfer files between computers with croc 🦿

If you're looking for an easy command-line tool to transfer files between systems on the same LAN, Jack Wallen believes croc is the tool for the job.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ GoCD bug chain provides second springboard to supply chain attacks πŸ—“οΈ

Follow-up to recent GoCD disclosure provides additional path to infiltrating build environments

πŸ“– Read

via "The Daily Swig".
⚠ S3 Ep58: Faces on Facebook, scams that pose as complaints, and a Kaseya bust [Podcast] ⚠

Latest epsiode - listen now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Third-Party Software Risks Grow, but So Do Solutions πŸ•΄

Enterprises are more dependent than ever on open source software and need to manage the risk posed by vulnerabilities in components and third-party vendors.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Insider IP Theft Is Surging β€” and Most Can't Stop It πŸ•΄

The Great Resignation is upon us, and insider IP theft is surging as a result. But it is a solvable problem.

πŸ“– Read

via "Dark Reading".
❌ Congress Mulls Ban on Big Ransom Payouts ❌

A bill introduced this week would regulate ransomware response by the country's critical financial sector.

πŸ“– Read

via "Threat Post".
🦿 Research: Supply chain and COVID-19 challenges forces companies to shift their security strategies 🦿

64% of survey respondents reported that their companies have concerns about security risks for supply chains.

πŸ“– Read

via "Tech Republic".
πŸ•΄ What Happens If Time Gets Hacked πŸ•΄

Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cloud Attack Analysis Unearths Lessons for Security Pros πŸ•΄

Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.

πŸ“– Read

via "Dark Reading".
❌ Cyber-Mercenary Group Void Balaur Attacks High-Profile Targets for Cash ❌

A Russian-language threat group is available for hire, to steal data on journalists, political leaders, activists and from organizations in every sector.

πŸ“– Read

via "Threat Post".
❌ Back-to-Back PlayStation 5 Hacks Hit on the Same Day ❌

Cyberattackers stole PS5 root keys and exploited the kernel, revealing rampant insecurity in gaming devices.

πŸ“– Read

via "Threat Post".