πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-0180 β€Ό

Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may allow an unauthenticated user to potentially enable privilege escalation via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41164 β€Ό

CKEditor4 is an open source WYSIWYG HTML editor. In affected versions a vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. The problem has been recognized and patched. The fix will be available in version 4.17.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0121 β€Ό

Improper access control in the installer for some Intel(R) Iris(R) Xe MAX Dedicated Graphics Drivers for Windows 10 before version 27.20.100.9466 may allow authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0069 β€Ό

Improper input validation in firmware for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and some Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33086 β€Ό

Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33059 β€Ό

Improper input validation in the Intel(R) Administrative Tools for Intel(R) Network Adapters driver for Windows before version 1.4.0.15, may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
❌ Fake Ransomware Infection Hits WordPress Sites ❌

WordPress sites have been splashed with ransomware warnings that are as real as dime-store cobwebs made out of spun polyester.

πŸ“– Read

via "Threat Post".
❌ Netflix Bait: Phishers Target Streamers with Fake Service Signups ❌

Lures dressed up to look like movie and TV streaming offers are swiping payment data.

πŸ“– Read

via "Threat Post".
πŸ•΄ Can I Have XDR Without EDR? πŸ•΄

Yes, extended detection and response is possible without endpoint detection and response, but here's why having both is helpful.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-43997 β€Ό

Amazon FreeRTOS 10.2.0 through 10.4.5 on the ARMv7-M and ARMv8-M MPU platforms does not prevent non-kernel code from calling the xPortRaisePrivilege and vPortResetPrivilege internal functions. This is fixed in 10.4.6 and in 10.4.3-LTS Patch 2.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ CISA Releases Incident and Vulnerability Response Playbooks to Strengthen Cybersecurity for Federal Civilian Agencies πŸ•΄

Effort part of President Biden’s executive order to improve the nation’s sybersecurity.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Sift Acquires Passwordless Authentication Pioneer Keyless to Provide Secure, Frictionless Authentication πŸ•΄

Biometric authentication innovator eliminates password-based account takeover and enables PSD2 Strong Customer Authentication while preserving user privacy.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Palo Alto Networks Delivers What's Next in Security at Ignite '21 πŸ•΄

Cybersecurity company introduces solutions aimed at network security, cloud security and security operations.

πŸ“– Read

via "Dark Reading".
πŸ“’ Intel CPU flaw could enable hackers to attack PCs, cars, and medical devices πŸ“’

Vulnerability found in Pentium, Celeron, and Atom processors

πŸ“– Read

via "ITPro".
πŸ“’ What are cookies πŸ“’

What do they do, how they work, and why does every website want you to accept them?

πŸ“– Read

via "ITPro".
πŸ“’ Identity-focussed security for your zero trust journey πŸ“’

Steps to protect your business from identity-driven threats

πŸ“– Read

via "ITPro".
πŸ“’ Iranian hacking groups are evolving, warns Microsoft πŸ“’

Cyber espionage groups are increasingly utilizing ransomware to either collect funds or disrupt their targets

πŸ“– Read

via "ITPro".
πŸ“’ NCSC: COVID-19 vaccines were prime target for hackers in 2021 πŸ“’

The GCHQ's cyber arm says 20% of cyber attacks this year targeted the health sector and key organisations involved in the vaccine rollout

πŸ“– Read

via "ITPro".
πŸ“’ Cryptomixers are helping hackers to launder ransomware payments πŸ“’

The services enable cyber criminals to anonymously clean proceeds from illicit activities

πŸ“– Read

via "ITPro".
πŸ“’ How do you become an ethical hacker? πŸ“’

We examine what certifications do you need, what jobs are available and how much you can expect to be paid

πŸ“– Read

via "ITPro".
πŸ“’ Emotet infrastructure has almost doubled since resurgence was confirmed πŸ“’

Researchers confirm the infrastructure has also been upgraded for a "better secured", more resilient operation

πŸ“– Read

via "ITPro".