πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Ukraine hosts large-scale simulation of cyber-attack against energy grid πŸ—“οΈ

SANS Institute’s latest Grid NetWars competition involved 250 security pros from Ukraine

πŸ“– Read

via "The Daily Swig".
❌ Convergence Ahoy: Get Ready for Cloud-Based Ransomware ❌

Oliver Tavakoli, CTO at Vectra AI, takes us inside the coming nexus of ransomware, supply-chain attacks and cloud deployments.

πŸ“– Read

via "Threat Post".
⚠ S3 Ep63: Log4Shell (what else?) and Apple kernel bugs [Podcast+Transcript] ⚠

Latest episode - listen now! (Yes, there are plenty of critical things to go along with Log4Shell.)

πŸ“– Read

via "Naked Security".
🦿 How password troubles could cost your online business potential sales 🦿

One in four online shoppers surveyed by Beyond Identity said they'd abandon a shopping cart of $100 or more if they had to reset their password to check out.

πŸ“– Read

via "Tech Republic".
πŸ•΄ CISA Issues Emergency Directive on Log4j πŸ•΄

The Cybersecurity Infrastructure and Security Agency orders federal agencies to take actions to mitigate vulnerabilities to the Apache Log4j flaw and attacks exploiting it.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Time to Reset the Idea of Zero Trust πŸ•΄

CISOs are increasingly drawn to the zero trust security model, but implementing a frictionless experience is still a challenge.

πŸ“– Read

via "Dark Reading".
πŸ•΄ PseudoManuscrypt Malware Targeted Government & ICS Systems in 2021 πŸ•΄

The "PseudoManuscrypt" operation infected some 35,000 computers with cyber-espionage malware and targeted computers in both government and private industry.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-41451 β€Ό

An HTTP/1.1 misconfiguration in web interface of TP-Link AX10v1 before V1_211117 could allow an attacker to send a specially crafted HTTP/0.9 packet that could cause a cache poisoning attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44035 β€Ό

Wolters Kluwer TeamMate AM 12.4 Update 1 mishandles attachment uploads, such that an authenticated user may download and execute malicious files.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Timely Questions for Log4j Response Now β€” And for the Future πŸ•΄

EXPERT INSIGHT: How to assess your exposure to the vulnerability with a combination of asset inventory, testing, solid information sources, and software bills of materials (SBOMs).

πŸ“– Read

via "Dark Reading".
❌ Brand-New Log4Shell Attack Vector Threatens Local Hosts ❌

The discovery, which affects services running as localhost that aren't exposed to any network or the internet, vastly widens the scope of attack possibilities.

πŸ“– Read

via "Threat Post".
⚠ Serious Security: OpenSSL fixes β€œerror conflation” bugs – how mixing up mistakes can lead to trouble ⚠

Have you ever seen the message "An error occurred"? Even worse, the message "This error cannot occur"? Facts matter!

πŸ“– Read

via "Naked Security".
πŸ•΄ Executive Partnerships Are Critical for Cybersecurity Success πŸ•΄

One leader alone can't protect an organization from cyber threats, C-suite leaders agree.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-37862 β€Ό

Mattermost 6.0 and earlier fails to sufficiently validate the email address during registration, which allows attackers to trick users into signing up using attacker-controlled email addresses via crafted invitation token.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32498 β€Ό

SICK SOPAS ET before version 4.8.0 allows attackers to manipulate the pathname of the emulator and use path traversal to run an arbitrary executable located on the host system. When the user starts the emulator from SOPAS ET the corresponding executable will be started instead of the emulator

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0673 β€Ό

In Audio Aurisys HAL, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05977326; Issue ID: ALPS05977326.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40851 β€Ό

TCMAN GIM is vulnerable to a lack of authorization in all available webservice methods listed in /PC/WebService.asmx. The exploitation of this vulnerability might allow a remote attacker to obtain information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40852 β€Ό

TCMAN GIM is affected by an open redirect vulnerability. This vulnerability allows the redirection of user navigation to pages controlled by the attacker. The exploitation of this vulnerability might allow a remote attacker to obtain information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0893 β€Ό

In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05687474.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0894 β€Ό

In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672038.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20608 β€Ό

Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior allows a remote unauthenticated attacker to cause a DoS condition in GX Works2 by getting GX Works2 to read a tampered program file from a Mitsubishi Electric PLC by sending malicious crafted packets to tamper with the program file.

πŸ“– Read

via "National Vulnerability Database".