πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-43273 β€Ό

An Out-of-bounds Read vulnerability exists in the DGN file reading procedure in Open Design Alliance Drawings SDK before 2022.11. Crafted data in a DGN file and lack of verification of input data can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43336 β€Ό

An Out-of-Bounds Write vulnerability exists when reading a DXF file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DXF files. Crafted data in a DXF file (an invalid number of properties) can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43390 β€Ό

An Out-of-Bounds Write vulnerability exists when reading a DGN file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DGN files. Crafted data in a DGN file and lack of proper validation of input data can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43280 β€Ό

A stack-based buffer overflow vulnerability exists in the DWF file reading procedure in Open Design Alliance Drawings SDK before 2022.8. The issue results from the lack of proper validation of the length of user-supplied data before copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-16152 β€Ό

The NetConfig UI administrative interface in Extreme Networks ExtremeWireless Aerohive HiveOS and IQ Engine through 10.0r8a allows attackers to execute PHP code as the root user via remote HTTP requests that insert this code into a log file and then traverse to that file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41057 β€Ό

In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43618 β€Ό

GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43620 β€Ό

An issue was discovered in the fruity crate through 0.2.0 for Rust. Security-relevant validation of filename extensions is plausibly affected. Methods of NSString for conversion to a string may return a partial result. Because they call CStr::from_ptr on a pointer to the string buffer, the string is terminated at the first '\0' byte, which might not be the end of the string.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Removing need to unlock mobile wallets for contactless payments has eroded security protections, researchers warn πŸ—“οΈ

Mind the gap

πŸ“– Read

via "The Daily Swig".
πŸ•΄ How Visibility Became the Lifeblood of SecOps and Business Success πŸ•΄

The best way to succeed in the long-term cybersecurity is to invest in visibility because you can't protect or defend against what you can't see.

πŸ“– Read

via "Dark Reading".
🦿 Facebook and Google "listening" is more pervasive than you think 🦿

Yet another consumer is disturbed by the sketchy algorithms deployed by Facebook. Here's how the app knows what you're talking about and what to do about it.

πŸ“– Read

via "Tech Republic".
🦿 Malicious shopping websites surge in number in advance of Black Friday 🦿

More than 5,300 malicious websites have popped up each week, the highest since the start of 2021, says Check Point Research.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Vulnerability in FBI email infrastructure allowed malicious actor to send false cyber-attack warnings to thousands πŸ—“οΈ

Security issue saw fake emails sent from legitimate agency accounts

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ Microsoft fixes reflected XSS in Exchange Server πŸ—“οΈ

Researchers’ bid to reproduce ProxyShell yields something entirely new

πŸ“– Read

via "The Daily Swig".
❌ FBI Says Its System Was Exploited to Email Fake Cyberattack Alert ❌

The alert was mumbo jumbo, but it was indeed sent from the bureau's email system, from the agency’s own internet address.

πŸ“– Read

via "Threat Post".
πŸ•΄ JupiterOne and Cisco Announce Launch of Secure Cloud Insights πŸ•΄

The partnership is designed to provide businesses with a range of cybersecurity services.

πŸ“– Read

via "Dark Reading".
🦿 Don't fall for LinkedIn phishing: How to watch for this credential-stealing attack 🦿

Cybercriminals are now using LinkedIn to find a way into your files. Learn how to detect phishing on LinkedIn and protect yourself from it.

πŸ“– Read

via "Tech Republic".
πŸ•΄ How to Negotiate With Ransomware Attackers πŸ•΄

Security researchers investigate the ransom negotiation process to create strategies businesses can use if they face an attack.

πŸ“– Read

via "Dark Reading".
🦿 How organizations are beefing up their cybersecurity to combat ransomware 🦿

Most organizations surveyed by Hitachi ID are moving partly to software-as-a-service. Less than half have adopted a Zero Trust strategy.

πŸ“– Read

via "Tech Republic".
❌ Cybercriminals Target Alibaba Cloud for Cryptomining, Malware ❌

Cybercriminals are targeting Alibaba Elastic Computing Service (ECS) instances, disabling certain security features to further their cryptomining goals. Alibaba offers a few unique options that make it a highly attractive target for attackers, researchers noted. According to research from Trend Micro, the Chinese giant’s cloud (also known as Aliyun) has a preinstalled security agent. While […]

πŸ“– Read

via "Threat Post".
πŸ” FTC Updates Safeguards Rule for Consumer Financial Information πŸ”

The FTC recently made changes to the Gramm-Leach-Bliley Act’s Safeguards Rule that should pose further privacy obligations to covered financial institutions.

πŸ“– Read

via "".