πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-4130 β€Ό

snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4131 β€Ό

livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45105 β€Ό

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Industry working group aims to standardize blockchain 'Identity of Things' πŸ“’

Universal standards for blockchain-based identities aims to help promote interoperability and communication between IoT devices

πŸ“– Read

via "ITPro".
πŸ“’ Sennheiser exposed personal data of 28,000 customers with leaky S3 bucket πŸ“’

Server containing full names, email addresses, phone numbers, and supplier information was left open to the public for three years

πŸ“– Read

via "ITPro".
πŸ“’ Kronos services knocked offline by ransomware attack πŸ“’

The popular human resources solutions provider has admitted that it may take "several weeks" to recover

πŸ“– Read

via "ITPro".
πŸ“’ Gumtree site code made personal data of users and sellers publicly accessible πŸ“’

Anyone could scan the website's HTML code to reveal personal information belonging to users of the popular second-hand classified adverts website

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ Ransomware groups will target smaller businesses in 2022 - report πŸ“’

Scrutiny from law enforcement is causing groups to change tack, says analyst

πŸ“– Read

via "ITPro".
πŸ“’ Meta expands bug bounty programme to cover data scraping πŸ“’

The move comes two years after a massive scraping incident on Facebook that resulted in data leaking online

πŸ“– Read

via "ITPro".
πŸ“’ What is the Log4Shell vulnerability? πŸ“’

The critical flaw affecting products built using Java is set to cause headaches in the enterprise for months to come

πŸ“– Read

via "ITPro".
πŸ“’ Australia and US sign CLOUD Act data-sharing deal to support criminal investigations πŸ“’

The legislation allows law enforcement to simplify the process of obtaining electronic data from another country

πŸ“– Read

via "ITPro".
πŸ“’ Google to rollout AI-based security across three UK airports πŸ“’

Airports in Aberdeen, Glasgow, and Southampton will test a tool designed to make it easier to spot suspicious packages

πŸ“– Read

via "ITPro".
πŸ“’ Lenovo ThinkPads vulnerable to privilege escalation exploit, researchers warn πŸ“’

A component running on the popular business computers is vulnerable to a chained exploit that grants full access to attackers

πŸ“– Read

via "ITPro".
πŸ“’ HMRC suffered 17 data breaches over 15 months πŸ“’

According to a recent report, the breaches affected more than 3,000 individuals

πŸ“– Read

via "ITPro".
πŸ“’ UK joint committee calls for tougher rules for tech giants πŸ“’

However, IT industry experts suggest Online Safety Bill proposals aren't clear enough for everyday users

πŸ“– Read

via "ITPro".
πŸ“’ Egyptian exiles targeted with Predator spyware resembling NSO Group's Pegasus πŸ“’

A high-profile politician and journalist have been targeted with spyware likely spread using WhatsApp messages

πŸ“– Read

via "ITPro".
πŸ“’ How to turn on Windows Defender πŸ“’

Find out how to switch on Windows Defender in Windows 10 and older versions of the OS

πŸ“– Read

via "ITPro".
πŸ“’ How do hackers choose their targets? πŸ“’

We explore what goes on in the minds of cyber criminals

πŸ“– Read

via "ITPro".
πŸ“’ Skip the three words thing, go straight for the β€˜use a password manager, dammit’ jugular πŸ“’

Why you can do so much better than the three-random-word rule that’s still being churned out by the NCSC

πŸ“– Read

via "ITPro".
πŸ“’ Five things to consider before choosing an MFA solution πŸ“’

Because we all should move on from using β€œpassword” as a password!

πŸ“– Read

via "ITPro".
πŸ“’ UK unveils Β£2.6 billion National Cyber Strategy πŸ“’

The strategy prioritises investing in the UK's cyber skills, improving cyber security responses, and disrupting state-backed cyber attacks

πŸ“– Read

via "ITPro".