πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Portuguese Media Giant Impresa Crippled by Ransomware Attack ❌

The websites of the company and the Expresso newspaper, as well as all of its SIC TV channels remained offline Tuesday after the New Year’s weekend attack.

πŸ“– Read

via "Threat Post".
🦿 Online privacy: DuckDuckGo just finished a banner year and looks for an even better 2022 🦿

Commentary: The privacy-oriented search engine keeps winning fans. Will it spur Google to improve its own privacy?

πŸ“– Read

via "Tech Republic".
πŸ•΄ Log4j Remediation Rules Now Available for WhiteSource Renovate and Enterprise πŸ•΄

The Software Composition Analysis leader now offers a remediation preset for WhiteSource Renovate and Enterprise, enabling users to identify and fix the Log4j vulnerability from hundreds of downstream dependent packages of Log4j.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Palo Alto Networks Appoints Helmut Reisinger to Leadership Team πŸ•΄

Reisinger joins as CEO, EMEA and Latin America, to accelerate global growth strategy.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Why CIOs Should Report to CISOs πŸ•΄

If the CISO is responsible for the security of the organization, then that same person also should be responsible for both security and IT infrastructure.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Latest web hacking tools – Q1 2022 πŸ—“οΈ

We take a look at the latest additions to security researchers’ armory

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-44168 β€Ό

A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3 may allow a local authenticated attacker to download arbitrary files on the device via specially crafted update packages.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43711 β€Ό

The downloadFlile.cgi binary file in TOTOLINK EX200 V4.0.3c.7646_B20201211 has a command injection vulnerability when receiving GET parameters. The parameter name can be constructed for unauthenticated command execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Vinnie Liu Has a Mission: Keeping People Safe Online and Offline πŸ•΄

Security Pro File: The years at the National Security Agency shaped Vinnie Liu's views on security. "We're missionaries, not mercenaries," he says.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ US retailer PulseTV warns of apparent credit card data breach πŸ—“οΈ

Payment system updated amidst fears 200,000 records may have been exposed

πŸ“– Read

via "The Daily Swig".
❌ McMenamins Data Breach Affects 12 Years of Employee Info ❌

The Pacific Northwest hospitality stalwart is also still operationally crippled by a Dec. 12 ransomware attack.

πŸ“– Read

via "Threat Post".
❌ Purple Fox Rootkit Dropped by Malicious Telegram Installers ❌

Multiple malicious installers were delivering the same Purple Fox rootkit version using the same attack chain, possibly distributed via email or phishing sites.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-45912 β€Ό

An unauthenticated Named Pipe channel in Controlup Real-Time Agent (cuAgent.exe) before 8.5 potentially allows an attacker to run OS commands via the ProcessActionRequest WCF method.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20012 β€Ό

In mdp driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05836478; Issue ID: ALPS05836478.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20013 β€Ό

In vow driver, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05837742; Issue ID: ALPS05837742.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20016 β€Ό

In vow driver, there is a possible memory corruption due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862986; Issue ID: ALPS05862986.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45389 β€Ό

StarWind SAN & NAS build 1578 and StarWind Command Center Build 6864 Update Manager allows authentication with JTW token which is signed with any key. An attacker could use self-signed JTW token to bypass authentication resulting in escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41789 β€Ό

In wifi driver, there is a possible system crash due to a missing validation check. This could lead to remote denial of service from a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20190426015; Issue ID: GN20190426015.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20020 β€Ό

In libvcodecdrv, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05943906; Issue ID: ALPS05943906.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20018 β€Ό

In seninf driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863018; Issue ID: ALPS05863018.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20019 β€Ό

In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.

πŸ“– Read

via "National Vulnerability Database".