πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ 200M Adult Cam Model, User Records Exposed in Stripchat Breach ❌

The leak included model information, chat messages and payment details.

πŸ“– Read

via "Threat Post".
🦿 14 tactics to use during a ransomware negotiation 🦿

Security researchers analyzed 700 incidents to understand the economics of these threats as well as what bargaining tactics work.

πŸ“– Read

via "Tech Republic".
❌ Rooting Malware Is Back for Mobile. Here’s What to Look Out For. ❌

Hank Schless, senior manager of security solutions at Lookout, discusses AbstractEmu, mobile malware found on Google Play, Amazon Appstore and the Samsung Galaxy Store.

πŸ“– Read

via "Threat Post".
πŸ•΄ Emotet Makes a Comeback πŸ•΄

The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cybercriminals Increasingly Employ Crypto-Mixers to Launder Stolen Profits πŸ•΄

Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.

πŸ“– Read

via "Dark Reading".
❌ FBI Email Hoaxer ID’ed by the Guy He Allegedly Loves to Torment ❌

Vinny Troia, the cybersecurity researcher mentioned in a fake alert gushed out of the FBI’s email system, says it's just one of a string of jabs from a childish but cybercriminally talented tormentor.

πŸ“– Read

via "Threat Post".
πŸ•΄ New Global Rackspace Technology Survey Underscores Rapid Pace of Cloud Adoption πŸ•΄

More than half of respondents have 100% of their infrastructure in the cloud; IT playing an increasingly critical role in driving corporate strategy.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Team Cymru Acquires Amplicy πŸ•΄

The combination of Team Cymru's threat intelligence and threat hunting capabilities and Amplicy's Internet asset discovery and vulnerability management will give enterprise defenders a comprehensive view of their organization's cyber risk.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Belarusian hackers claim to have accessed full database of those crossing the country’s borders πŸ—“οΈ

β€˜Belarus Cyber-Partisans’ say they gained access to all entries in and out of the country over the past 15 years

πŸ“– Read

via "The Daily Swig".
❌ Phishing Scam Aims to Hijack TikTok β€˜Influencer’ Accounts ❌

Threat actors used malicious emails to target more than 125 people with high-profile TikTok accounts in an attempt to steal info and lock them out.

πŸ“– Read

via "Threat Post".
🦿 Your weak passwords can be cracked in less than a second 🦿

Easy-to-crack phrases "123456," "123456789," "12345," "qwerty" and "password" are the five most common passwords, says NordPass.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Belarus Linked to Big European Disinformation Campaign πŸ•΄

EU officials and others previously had blamed Russia's intelligence operations for the so-called Ghostwriter campaign.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Vulnerabilities in GitHub NPM packages could allow threat actors to publish malicious versions πŸ—“οΈ

Details of flaws were made public this week

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2020-12951 β€Ό

Race condition in PSP FW could allow less privileged x86 code to perform PSP SMM operations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38984 (security_guardium_key_lifecycle_manager, security_key_lifecycle_manager) β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212793.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26321 β€Ό

Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41244 β€Ό

Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update usersÒ€ℒ roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users' roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24856 β€Ό

The Shared Files WordPress plugin before 1.6.61 does not sanitise and escape the Download Counter Text settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12904 β€Ό

Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43495 β€Ό

AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability in alquist/IO/input.py. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41950 β€Ό

A directory traversal issue in ResourceSpace 9.6 before 9.6 rev 18277 allows remote unauthenticated attackers to delete arbitrary files on the ResourceSpace server via the provider and variant parameters in pages/ajax/tiles.php. Attackers can delete configuration or source code files, causing the application to become unavailable to all users.

πŸ“– Read

via "National Vulnerability Database".