πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Alan Paller: Infosec world pays homage after SANS founder and infosec luminary dies πŸ—“οΈ

β€˜His vision has changed the lives of hundreds of thousands of security practitioners’

πŸ“– Read

via "The Daily Swig".
❌ Millions of Routers, IoT Devices at Risk from New Open-Source Malware ❌

BotenaGo, written in Google’s Golang programming language, can exploit more than 30 different vulnerabilities.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ HTML smuggling: Fresh attack technique is being used to increasingly target banking sector πŸ—“οΈ

Evasive malware is being spread via email in campaigns similar to those of nation-state actors

πŸ“– Read

via "The Daily Swig".
πŸ•΄ How to Hire ο»Ώβ€” and Retain ο»Ώβ€”ο»Ώ Effective Threat Hunters πŸ•΄

Key characteristics that should be evaluated include curiosity, disposition, and fit with the culture.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-43494 β€Ό

OpenCV-REST-API master branch as of commit 69be158c05d4dd5a4aff38fdc680a162dd6b9e49 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43496 β€Ό

Clustering master branch as of commit 53e663e259bcfc8cdecb56c0bb255bd70bfcaa70 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38972 β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4140 β€Ό

IBM Security SiteProtector System 3.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174052.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43493 β€Ό

ServerManagement master branch as of commit 49491cc6f94980e6be7791d17be947c27071eb56 is affected by a directory traversal vulnerability. This vulnerability can be used to extract credentials which can in turn be used to execute code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4146 β€Ό

IBM Security SiteProtector System 3.1.1 could allow a remote attacker to obtain sensitive information, caused by missing 'HttpOnly' flag. A remote attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 174129.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38973 β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38985 β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43492 β€Ό

AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system andcan significantly aid in getting remote code access.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep58: Faces on Facebook, scams that pose as complaints, and a Kaseya bust [Podcast] ⚠

Latest epsiode - listen now!

πŸ“– Read

via "Naked Security".
🦿 Score an extra 15% discount on this cyber analysis training on sale ahead of Black Friday 🦿

Eight courses and 51 hours of content on CompTIA CySA+, ethical hacking, social engineering and more. Everything you need to be a certified cybersecurity analyst.

πŸ“– Read

via "Tech Republic".
❌ Mac Zero Day Targets Apple Devices in Hong Kong ❌

Google researchers have detailed a widespread watering-hole attack that installed a backdoor on Apple devices that visited Hong Kong-based media and pro-democracy sites.

πŸ“– Read

via "Threat Post".
πŸ” Friday Five 11/12 πŸ”

Apple fixes a macOS zero day, Microsoft warns of HTML smuggling phishing attacks, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
⚠ Samba update patches plaintext passwork plundering problem ⚠

When Microsoft itself says STOP USING X, where X is one of its own protocols... we think you should listen.

πŸ“– Read

via "Naked Security".
🦿 The mobile VPNs of 2021 that you need to try 🦿

Privacy is essential, especially on a mobile device. These five options available for both Android and iOS can help keep your device secure and your traffic private, but not without cost.

πŸ“– Read

via "Tech Republic".
🦿 How AI fights fraud in the telecom industry 🦿

Americans lost $29.8 billion in phone fraud over the past year. Can AI fraud detection change this?

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-41264 β€Ό

OpenZeppelin Contracts is a library for smart contract development. In affected versions upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. For users unable to upgrade; initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301).

πŸ“– Read

via "National Vulnerability Database".