πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Attackers Actively Target Windows Installer Zero-Day ❌

Researcher discovered a β€œmore powerful” variant of an elevation-of-privilege flaw for which Microsoft released a botched patch earlier this month.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Cyberstalking study: UK residents most accepting of spyware to track partners’ movements πŸ—“οΈ

Report from cybersecurity firm Kaspersky reveals worrying attitudes towards spyware usage

πŸ“– Read

via "The Daily Swig".
πŸ•΄ When Will Security Frameworks Catch Up With the New Cybersecurity Normal? πŸ•΄

Standards need to reflect that most endpoints will be remote and/or wireless.

πŸ“– Read

via "Dark Reading".
πŸ” DG Insights to Help Leaders Assess DLP Effectiveness πŸ”

Digital Guardian's Managed Security Program customers can now receive a weekly email that gives further insight into their organization's data movement.

πŸ“– Read

via "".
🦿 Apple needs to un-Mac-ify security and privacy in Safari 🦿

Safari is a good browser, but it could be better. Unfortunately, one area that requires improvement is the un-Mac-ifying of the privacy settings. Find out what Jack Wallen means by this.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Decrypting diversity: One in five UK infosec professionals say they’ve experienced discrimination at work πŸ—“οΈ

Report states diversity and inclusion within the industry is lagging behind

πŸ“– Read

via "The Daily Swig".
❌ Apple’s NSO Group Lawsuit Amps Up Pressure on Pegasus Spyware-Maker ❌

Just weeks after a judge ruled that NSO Group did not have immunity in a suit brought by Facebook subsidiary WhatsApp, Apple is adding significant weight to the company's woes.

πŸ“– Read

via "Threat Post".
❌ GoDaddy Breach Widens to Include Reseller Subsidiaries ❌

Customers of several brands that resell GoDaddy Managed WordPress have also been caught up in the big breach, in which millions of emails, passwords and more were stolen.

πŸ“– Read

via "Threat Post".
πŸ›  GNU Privacy Guard 2.2.33 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.

πŸ“– Read

via "Packet Storm Security".
⚠ GoDaddy admits to password breach: check your Managed WordPress site! ⚠

GoDaddy found crooks in its network, and kicked them out - but not before they'd been in there for six weeks.

πŸ“– Read

via "Naked Security".
⚠ Check your patches – public exploit now out for critical Exchange bug ⚠

It was a zero-day bug until Patch Tuesday, now there's an anyone-can-use-it exploit. Don't be the one who hasn't patched.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-20840 β€Ό

Cross-site scripting vulnerability in Booking Package - Appointment Booking Calendar System versions prior to 1.5.11 allows a remote attacker to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20843 β€Ό

Cross-site script inclusion vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to alter the settings of the product via a specially crafted web page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3554 β€Ό

Improper Access Control vulnerability in the patchesUpdate API as implemented in Bitdefender Endpoint Security Tools for Linux as a relay role allows an attacker to manipulate the remote address used for pulling patches. This issue affects: Bitdefender Endpoint Security Tools for Linux versions prior to 6.6.27.390; versions prior to 7.1.2.33. Bitdefender Unified Endpoint versions prior to 6.2.21.160. Bitdefender GravityZone versions prior to 6.24.1-1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20845 β€Ό

Cross-site request forgery (CSRF) vulnerability in Unlimited Sitemap Generator versions prior to v8.2 allows a remote attacker to hijack the authentication of an administrator and conduct arbitrary operation via a specially crafted web page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43780 β€Ό

Redash is a package for data visualization and sharing. In versions 10.0 and priorm the implementation of URL-loading data sources like JSON, CSV, or Excel is vulnerable to advanced methods of Server Side Request Forgery (SSRF). These vulnerabilities are only exploitable on installations where a URL-loading data source is enabled. As of time of publication, the `master` and `release/10.x.x` branches address this by applying the Advocate library for making http requests instead of the requests library directly. Users should upgrade to version 10.0.1 to receive this patch. There are a few workarounds for mitigating the vulnerability without upgrading. One can disable the vulnerable data sources entirely, by adding the following env variable to one's configuration, making them unavailable inside the webapp. One can switch any data source of certain types (viewable in the GitHub Security Advisory) to be `View Only` for all groups on the Settings > Groups > Data Sources screen. For users unable to update an admin may modify Redash's configuration through environment variables to mitigate this issue. Depending on the version of Redash, an admin may also need to run a CLI command to re-encrypt some fields in the database. The `master` and `release/10.x.x` branches as of time of publication have removed the default value for `REDASH_COOKIE_SECRET`. All future releases will also require this to be set explicitly. For existing installations, one will need to ensure that explicit values are set for the `REDASH_COOKIE_SECRET` and `REDASH_SECRET_KEY `variables.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32037 β€Ό

An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled environment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20848 β€Ό

Cross-site scripting vulnerability in rwtxt versions prior to v1.8.6 allows a remote attacker to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20844 β€Ό

Improper neutralization of HTTP request headers for scripting syntax vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to obtain sensitive information via a specially crafted web page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20841 β€Ό

Improper access control in Management screen of EC-CUBE 2 series 2.11.2 to 2.17.1 allows a remote authenticated attacker to bypass access restriction and to alter System settings via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20846 β€Ό

Cross-site request forgery (CSRF) vulnerability in Push Notifications for WordPress (Lite) versions prior to 6.0.1 allows a remote attacker to hijack the authentication of an administrator and conduct an arbitrary operation via a specially crafted web page.

πŸ“– Read

via "National Vulnerability Database".