πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ β€˜Be Afraid:’ Massive Cyberattack Downs Ukrainian Gov’t Sites ❌

As Moscow moves troops and threatens military action, about 70 Ukrainian government sites were hit. β€œBe afraid” was scrawled on the Foreign Ministry site.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Researcher discloses alleged zero-day vulnerabilities in NUUO NVRmini2 recording device πŸ—“οΈ

Exploit code has also been released for flaws that supposedly date back to 2016

πŸ“– Read

via "The Daily Swig".
❌ Real Big Phish: Mobile Phishing & Managing User Fallibility ❌

Phishing is more successful than ever. Daniel Spicer, CSO of Ivanti, discusses emerging trends in phishing, and using zero-trust security to patch the human vulnerabilities underpinning the spike.

πŸ“– Read

via "Threat Post".
❌ Critical Cisco Contact Center Bug Threatens Customer-Service Havoc ❌

Attackers could access and modify agent resources, telephone queues and other customer-service systems – and access personal information on companies’ customers.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-32650 β€Ό

October CMS is a self-hosted content management system (CMS) platform based on the Laravel PHP Framework. Prior to versions 1.0.473 and 1.1.6, an attacker with access to the backend is able to execute PHP code by using the theme import feature. This will bypass the safe mode feature that prevents PHP execution in the CMS templates.The issue has been patched in Build 473 (v1.0.473) and v1.1.6. Those unable to upgrade may apply the patch to their installation manually as a workaround.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32649 β€Ό

October CMS is a self-hosted content management system (CMS) platform based on the Laravel PHP Framework. Prior to versions 1.0.473 and 1.1.6, an attacker with "create, modify and delete website pages" privileges in the backend is able to execute PHP code by running specially crafted Twig code in the template markup. The issue has been patched in Build 473 (v1.0.473) and v1.1.6. Those unable to upgrade may apply the patch to their installation manually as a workaround.

πŸ“– Read

via "National Vulnerability Database".
🦿 7 obstacles that organizations face migrating legacy data to the cloud 🦿

Some of the major obstacles center on concerns about compliance, fears about security and infrastructure and uncertainty about budget requirements, says Archive360.

πŸ“– Read

via "Tech Republic".
❌ Top Illicit Carding Marketplace UniCC Abruptly Shuts Down   ❌

UniCC controlled 30 percent of the stolen payment-card data market; leaving analysts eyeing what’s next.

πŸ“– Read

via "Threat Post".
πŸ•΄ White House Meets With Software Firms and Open Source Orgs on Security πŸ•΄

The Log4j vulnerability is only the latest security flaw to have global impact, prompting the Biden administration and software developers to pledge to produce more secure software.

πŸ“– Read

via "Dark Reading".
⚠ Serious Security: Linux full-disk encryption bug fixed – patch now! ⚠

Imagine if someone who didn't have your password could sneakily modify data that was encrypted with it.

πŸ“– Read

via "Naked Security".
πŸ•΄ Maryland Dept. of Health Responds to Ransomware Attack πŸ•΄

An attack discovered on Dec. 4, 2021, forced the Maryland Department of Health to take some of its systems offline.

πŸ“– Read

via "Dark Reading".
🦿 Russia arrests REvil ransomware gang members at request of US officials 🦿

Russia's Federal Security Service said that 14 people were arrested and millions in currency has been seized.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-13715 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13721 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13042 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12945 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13742 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13741 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13049 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13743 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13080 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".