🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🦿 How to easily transfer files between computers with croc 🦿

If you're looking for an easy command-line tool to transfer files between systems on the same LAN, Jack Wallen believes croc is the tool for the job.

📖 Read

via "Tech Republic".
🗓️ GoCD bug chain provides second springboard to supply chain attacks 🗓️

Follow-up to recent GoCD disclosure provides additional path to infiltrating build environments

📖 Read

via "The Daily Swig".
S3 Ep58: Faces on Facebook, scams that pose as complaints, and a Kaseya bust [Podcast]

Latest epsiode - listen now!

📖 Read

via "Naked Security".
🕴 Third-Party Software Risks Grow, but So Do Solutions 🕴

Enterprises are more dependent than ever on open source software and need to manage the risk posed by vulnerabilities in components and third-party vendors.

📖 Read

via "Dark Reading".
🕴 Insider IP Theft Is Surging — and Most Can't Stop It 🕴

The Great Resignation is upon us, and insider IP theft is surging as a result. But it is a solvable problem.

📖 Read

via "Dark Reading".
Congress Mulls Ban on Big Ransom Payouts

A bill introduced this week would regulate ransomware response by the country's critical financial sector.

📖 Read

via "Threat Post".
🦿 Research: Supply chain and COVID-19 challenges forces companies to shift their security strategies 🦿

64% of survey respondents reported that their companies have concerns about security risks for supply chains.

📖 Read

via "Tech Republic".
🕴 What Happens If Time Gets Hacked 🕴

Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure.

📖 Read

via "Dark Reading".
🕴 Cloud Attack Analysis Unearths Lessons for Security Pros 🕴

Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.

📖 Read

via "Dark Reading".
Cyber-Mercenary Group Void Balaur Attacks High-Profile Targets for Cash

A Russian-language threat group is available for hire, to steal data on journalists, political leaders, activists and from organizations in every sector.

📖 Read

via "Threat Post".
Back-to-Back PlayStation 5 Hacks Hit on the Same Day

Cyberattackers stole PS5 root keys and exploited the kernel, revealing rampant insecurity in gaming devices.

📖 Read

via "Threat Post".
Invest in These 3 Key Security Technologies to Fight Ransomware

Ransomware volumes are up 1000%. Aamir Lakhani, cybersecurity researcher and practitioner at FortiGuard Labs , discusses secure email, network segmentation and sandboxing for defense.

📖 Read

via "Threat Post".
🦿 Learn how to become an ethical hacker for only $21 during this pre-Black Friday sale 🦿

You don't need to break the bank to get the training required for an exciting new career, especially when you've got the right coupon code.

📖 Read

via "Tech Republic".
CVE-2002-20001

The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.

📖 Read

via "National Vulnerability Database".
🕴 How Do I Know It's Time to Consider a SASE Migration? 🕴

The rapid shift to a hybrid workplace and accelerated adoption of new technologies means it's time to rethink networking security approaches.

📖 Read

via "Dark Reading".
CVE-2021-3908

OctoRPKI does not limit the depth of a certificate chain, allowing for a CA to create children in an ad-hoc fashion, thereby making tree traversal never end.

📖 Read

via "National Vulnerability Database".
CVE-2021-3909

OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes to keep the connection alive.

📖 Read

via "National Vulnerability Database".
CVE-2021-3910

OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded NUL (\0) character).

📖 Read

via "National Vulnerability Database".
CVE-2021-3907

OctoRPKI does not escape a URI with a filename containing "..", this allows a repository to create a file, (ex. rsync://example.org/repo/../../etc/cron.daily/evil.roa), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on.

📖 Read

via "National Vulnerability Database".
CVE-2021-3912

OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash).

📖 Read

via "National Vulnerability Database".
CVE-2021-3911

If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash.

📖 Read

via "National Vulnerability Database".