πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Insider threats: How trustworthy are your employees? 🦿

While we often worry about outside threats to our business data, insider threats are a growing problem. Here's how to secure your business.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Planned Parenthood LA Breach Compromises 400,000 Patients' Data πŸ•΄

The breach, which compromised data such as insurance details and prescription information, took place between Oct. 9 and Oct. 17.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-44050 β€Ό

CA Network Flow Analysis (NFA) 21.2.1 and earlier contain a SQL injection vulnerability in the NFA web application, due to insufficient input validation, that could potentially allow an authenticated user to access sensitive data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40334 β€Ό

Missing Handler vulnerability in the proprietary management protocol (port TCP 5558) of Hitachi Energy FOX61x, XCM20 allows an attacker that exploits the vulnerability by activating SSH on port TCP 5558 to cause disruption to the NMS and NE communication. This issue affects: Hitachi Energy FOX61x versions prior to R15A. Hitachi Energy XCM20 versions prior to R15A.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40333 β€Ό

Weak Password Requirements vulnerability in Hitachi Energy FOX61x, XCM20 allows an attacker to gain unauthorized access to the Data Communication Network (DCN) routing configuration. This issue affects: Hitachi Energy FOX61x versions prior to R15A. Hitachi Energy XCM20 versions prior to R15A.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43327 β€Ό

An issue was discovered on Renesas RX65 and RX65N devices. With a VCC glitch, an attacker can extract the security ID key from the device. Then, the protected firmware can be extracted.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Top 5 Reasons to Get 'SASE' With Security πŸ•΄

Proactively updating and integrating technology, and ensuring tight collaboration between IT and security … it's simple, right? Well, not always – especially for organizations with limited resources.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Darktrace Reports 30% More Ransomware Attacks Targeting Organizations During the Holiday Period πŸ•΄

Researchers also observed a 70% average increase in attempted ransomware attacks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-36129 β€Ό

AOM v2.0.1 was discovered to contain a stack buffer overflow via the component src/aom_image.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36135 β€Ό

AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component rate_hist.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36134 β€Ό

AOM v2.0.1 was discovered to contain a segmentation violation via the component aom_dsp/x86/obmc_sad_avx2.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36131 β€Ό

AOM v2.0.1 was discovered to contain a stack buffer overflow via the component stats/rate_hist.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28237 β€Ό

LibreDWG v0.12.3 was discovered to contain a heap-buffer overflow via decode_preR13.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28236 β€Ό

LibreDWG v0.12.3 was discovered to contain a NULL pointer dereference via out_dxfb.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36130 β€Ό

AOM v2.0.1 was discovered to contain a NULL pointer dereference via the component av1/av1_dx_iface.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36133 β€Ό

AOM v2.0.1 was discovered to contain a global buffer overflow via the component av1/encoder/partition_search.h.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Ransomware, Carding, and Initial Access Brokers: Group-IB Presents Report on Trending Crimes πŸ•΄

Report explores cybercrime developments from the second half of 2020 through the first half of 2021.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ FTC implements tougher data protection rules to safeguard customer information πŸ—“οΈ

New requirements for financial institutions include vulnerability assessments, employee training

πŸ“– Read

via "The Daily Swig".
❌ Threat Group Takes Aim Again at Cloud Platform Provider Zoho ❌

Attackers that previously targeted the cloud platform provider have shifted their focus to additional products in the company’s portfolio.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-44020 β€Ό

An unnecessary privilege vulnerability in Trend Micro Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-44019 and 44021.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4000 β€Ό

showdoc is vulnerable to URL Redirection to Untrusted Site

πŸ“– Read

via "National Vulnerability Database".