πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  Hashcat Advanced Password Recovery 6.2.5 Source Code πŸ› 

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
🦿 Mozilla has released a new platform for privacy-focused email communications 🦿

When you don't want to give out your personal or work email address, but still need to sign up for an account, Mozilla might have an answer for you with Firefox Relay.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-23673 β€Ό

This affects all versions of package pekeupload. If an attacker induces a user to upload a file whose name contains javascript code, the javascript code will be executed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23732 β€Ό

This affects all versions of package docker-cli-js. If the command parameter of the Docker.command method can at least be partially controlled by a user, they will be in a position to execute any arbitrary OS commands on the host system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23718 β€Ό

The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-5640 β€Ό

Rapid7 Nexpose versions prior to 6.6.114 suffer from an information exposure issue whereby, when the user's session has ended due to inactivity, an attacker can use the inspect element browser feature to remove the login panel and view the details available in the last webpage visited by previous user

πŸ“– Read

via "National Vulnerability Database".
❌ Imunify360 Bug Leaves Linux Web Servers Open to Code Execution, Takeover ❌

CloudLinux' security platform for Linux-based websites and web servers contains a high-severity PHP deserialization bug.

πŸ“– Read

via "Threat Post".
❌ Attackers Hijack Email Threads Using ProxyLogon/ProxyShell Flaws ❌

Exploiting Microsoft Exchange ProxyLogon & ProxyShell vulnerabilities, attackers are malspamming replies in existing threads and slipping past malicious-email filters.

πŸ“– Read

via "Threat Post".
🦿 Leaders agree that cybersecurity is a business risk, but are they acting on that belief? 🦿

Despite nearly unanimous agreement, there's still a lack of clarity on who is accountable for security incidents and whether previous security investments have paid off, a Gartner survey finds.

πŸ“– Read

via "Tech Republic".
❌ Online Merchants: Prevent Fraudsters from Becoming Holiday Grinches ❌

Black Friday and Cyber Monday approach! Saryu Nayyar, CEO at Gurucul, discusses concerning statistics about skyrocketing online fraud during the festive season.

πŸ“– Read

via "Threat Post".
πŸ•΄ 10 Stocking Stuffers for Security Geeks πŸ•΄

Check out our list of gifts with a big impact for hackers and other techie security professionals.

πŸ“– Read

via "Dark Reading".
πŸ” What's the Biggest Healthcare Security Threat for 2021 And Beyond? πŸ”

We asked 21 cybersecurity experts and healthcare executives what the biggest security threat they're facing in 2021 and beyond is.

πŸ“– Read

via "".
β€Ό CVE-2021-42707 β€Ό

PLC Editor Versions 1.3.8 and prior is vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42705 β€Ό

PLC Editor Versions 1.3.8 and prior is vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38448 β€Ό

The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44143 β€Ό

A flaw was found in mbsync in isync 1.4.0 through 1.4.3. Due to an unchecked condition, a malicious or compromised IMAP server could use a crafted mail message that lacks headers (i.e., one that starts with an empty line) to provoke a heap overflow, which could conceivably be exploited for remote code execution.

πŸ“– Read

via "National Vulnerability Database".
🦿 GoDaddy security breach impacts more than 1 million WordPress users 🦿

The hosting company has revealed a security incident that exposed the email addresses and customer numbers of 1.2 million Managed WordPress customers.

πŸ“– Read

via "Tech Republic".
β™ŸοΈ Arrest in β€˜Ransom Your Employer’ Email Scheme β™ŸοΈ

In August, KrebsOnSecurity warned that scammers were contacting people and asking them to unleash ransomware inside their employer's network, in exchange for a percentage of any ransom amount paid by the victim company. This week, authorities in Nigeria arrested a suspect in connection with the scheme -- a young man who said he was trying to save up money to help fund a new social network.

πŸ“– Read

via "Krebs on Security".
❌ GoDaddy’s Latest Breach Affects 1.2M Customers ❌

The kingpin domain registrar has logged its fifth cyber-incident since 2018, after an attacker with a compromised password stole email addresses, SSH keys and database logins.

πŸ“– Read

via "Threat Post".
🦿 How to install and use InVID, a plugin to debunk fake news and verify videos and images 🦿

You can make sure you aren't seeing fake news, edited photos or deepfakes with this software. Here's how to install and use it.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Bug Bounties Surge as Firms Compete for Talent πŸ•΄

Companies such as GItLab, which today increased its payment for critical bugs by 75%, are raising bounties and bonuses to attract top-notch researchers.

πŸ“– Read

via "Dark Reading".