β 200M Adult Cam Model, User Records Exposed in Stripchat Breach β
π Read
via "Threat Post".
The leak included model information, chat messages and payment details.π Read
via "Threat Post".
Threat Post
200M Adult Cam Model, User Records Exposed in Stripchat Breach
The leak included model information, chat messages and payment details.
π¦Ώ 14 tactics to use during a ransomware negotiation π¦Ώ
π Read
via "Tech Republic".
Security researchers analyzed 700 incidents to understand the economics of these threats as well as what bargaining tactics work.π Read
via "Tech Republic".
TechRepublic
14 tactics to use during a ransomware negotiation
Security researchers analyzed 700 incidents to understand the economics of these threats as well as what bargaining tactics work.
β Rooting Malware Is Back for Mobile. Hereβs What to Look Out For. β
π Read
via "Threat Post".
Hank Schless, senior manager of security solutions at Lookout, discusses AbstractEmu, mobile malware found on Google Play, Amazon Appstore and the Samsung Galaxy Store.π Read
via "Threat Post".
Threat Post
Rooting Malware Is Back for Mobile. Hereβs What to Look Out For.
Hank Schless, senior manager of security solutions at Lookout, discusses AbstractEmu, mobile malware found on Google Play, Amazon Appstore and the Samsung Galaxy Store.
π΄ Emotet Makes a Comeback π΄
π Read
via "Dark Reading".
The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.π Read
via "Dark Reading".
Dark Reading
Emotet Makes a Comeback
The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.
π΄ Cybercriminals Increasingly Employ Crypto-Mixers to Launder Stolen Profits π΄
π Read
via "Dark Reading".
Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.π Read
via "Dark Reading".
Dark Reading
Cybercriminals Increasingly Employ Crypto-Mixers to Launder Stolen Profits
Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.
β FBI Email Hoaxer IDβed by the Guy He Allegedly Loves to Torment β
π Read
via "Threat Post".
Vinny Troia, the cybersecurity researcher mentioned in a fake alert gushed out of the FBIβs email system, says it's just one of a string of jabs from a childish but cybercriminally talented tormentor.π Read
via "Threat Post".
Threat Post
FBI Email Hoaxer IDβed by the Guy He Allegedly Loves to Torment
Vinny Troia, the cybersecurity researcher mentioned in a fake alert gushed out of the FBIβs email system, says it's just one of a string of jabs from a childish but cybercriminally talented tormentor.
π΄ New Global Rackspace Technology Survey Underscores Rapid Pace of Cloud Adoption π΄
π Read
via "Dark Reading".
More than half of respondents have 100% of their infrastructure in the cloud; IT playing an increasingly critical role in driving corporate strategy.π Read
via "Dark Reading".
Dark Reading
New Global Rackspace Technology Survey Underscores Rapid Pace of Cloud Adoption
More than half of respondents have 100% of their infrastructure in the cloud; IT playing an increasingly critical role in driving corporate strategy.
π΄ Team Cymru Acquires Amplicy π΄
π Read
via "Dark Reading".
The combination of Team Cymru's threat intelligence and threat hunting capabilities and Amplicy's Internet asset discovery and vulnerability management will give enterprise defenders a comprehensive view of their organization's cyber risk.π Read
via "Dark Reading".
Dark Reading
Team Cymru Acquires Amplicy
The combination of Team Cymru's threat intelligence and threat hunting capabilities and Amplicy's Internet asset discovery and vulnerability management will give enterprise defenders a comprehensive view of their organization's cyber risk.
ποΈ Belarusian hackers claim to have accessed full database of those crossing the countryβs borders ποΈ
π Read
via "The Daily Swig".
βBelarus Cyber-Partisansβ say they gained access to all entries in and out of the country over the past 15 yearsπ Read
via "The Daily Swig".
β Phishing Scam Aims to Hijack TikTok βInfluencerβ Accounts β
π Read
via "Threat Post".
Threat actors used malicious emails to target more than 125 people with high-profile TikTok accounts in an attempt to steal info and lock them out.π Read
via "Threat Post".
Threat Post
Phishing Scam Aims to Hijack TikTok βInfluencerβ Accounts
Threat actors used malicious emails to target more than 125 people with high-profile TikTok accounts in an attempt to steal info and lock them out.
π¦Ώ Your weak passwords can be cracked in less than a second π¦Ώ
π Read
via "Tech Republic".
Easy-to-crack phrases "123456," "123456789," "12345," "qwerty" and "password" are the five most common passwords, says NordPass.π Read
via "Tech Republic".
TechRepublic
Your weak passwords can be cracked in less than a second
Easy-to-crack phrases "123456," "123456789," "12345," "qwerty" and "password" are the five most common passwords, says NordPass.
π΄ Belarus Linked to Big European Disinformation Campaign π΄
π Read
via "Dark Reading".
EU officials and others previously had blamed Russia's intelligence operations for the so-called Ghostwriter campaign.π Read
via "Dark Reading".
Dark Reading
Belarus Linked to Big European Disinformation Campaign
EU officials and others previously had blamed Russia's intelligence operations for the so-called Ghostwriter campaign.
ποΈ Vulnerabilities in GitHub NPM packages could allow threat actors to publish malicious versions ποΈ
π Read
via "The Daily Swig".
Details of flaws were made public this weekπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Vulnerabilities in NPM allowed threat actors to publish new version of any package
Details of flaws were made public this week
βΌ CVE-2020-12951 βΌ
π Read
via "National Vulnerability Database".
Race condition in PSP FW could allow less privileged x86 code to perform PSP SMM operations.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38984 (security_guardium_key_lifecycle_manager, security_key_lifecycle_manager) βΌ
π Read
via "National Vulnerability Database".
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212793.π Read
via "National Vulnerability Database".
βΌ CVE-2021-26321 βΌ
π Read
via "National Vulnerability Database".
Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41244 βΌ
π Read
via "National Vulnerability Database".
Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update usersΓ’β¬β’ roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users' roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24856 βΌ
π Read
via "National Vulnerability Database".
The Shared Files WordPress plugin before 1.6.61 does not sanitise and escape the Download Counter Text settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowedπ Read
via "National Vulnerability Database".
βΌ CVE-2020-12904 βΌ
π Read
via "National Vulnerability Database".
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43495 βΌ
π Read
via "National Vulnerability Database".
AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability in alquist/IO/input.py. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41950 βΌ
π Read
via "National Vulnerability Database".
A directory traversal issue in ResourceSpace 9.6 before 9.6 rev 18277 allows remote unauthenticated attackers to delete arbitrary files on the ResourceSpace server via the provider and variant parameters in pages/ajax/tiles.php. Attackers can delete configuration or source code files, causing the application to become unavailable to all users.π Read
via "National Vulnerability Database".