πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 IT pros say privacy regulations are more helpful than harmful 🦿

Cisco's 2022 data privacy study finds that privacy budgets are up, and companies are seeing good return on these investments.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-22570 β€Ό

Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0362 β€Ό

SQL Injection in Packagist showdoc/showdoc prior to 2.10.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22600 β€Ό

A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0203 β€Ό

Improper Access Control in GitHub repository crater-invoice/crater prior to 6.0.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0361 β€Ό

Heap-based Buffer Overflow in Conda vim prior to 8.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ US healthcare company EyeMed reaches settlement following 2020 data breach πŸ—“οΈ

Vision benefits provider agrees to $600,000

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Why It's Time to Rethink Incident Response πŸ•΄

The incident response landscape has changed drastically, largely from shifting attitudes among insurance companies and, to some extent, business customers feeling the pain of security incidents.

πŸ“– Read

via "Dark Reading".
🦿 More than 90% of enterprises surveyed have been hit by successful cyberattacks 🦿

Since the start of the pandemic, some 83% of those polled by Anomali have seen an increase in attempted cyberattacks, while most have witnessed a rise in phishing emails.

πŸ“– Read

via "Tech Republic".
🦿 Cybercriminals exploiting COVID-19 tests in phishing attacks 🦿

Scammers are taking advantage of the focus on COVID-19 testing and the need for at-home test kits, says Barracuda Networks.

πŸ“– Read

via "Tech Republic".
πŸ•΄ VPNLab.net Shuttered in Latest Spate of Global Takedowns πŸ•΄

Europol and 10 nations seized servers and disconnected the anonymous network allegedly used by many cybercriminals in the latest effort to hobble cybercrime groups.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-22851 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the specialization parameter in doctors.php

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44692 β€Ό

BuddyBoss Platform through 1.8.0 allows remote attackers to obtain the email address of each user. When creating a new user, it generates a Unique ID for their profile. This UID is their private email address with symbols removed and periods replaced with hyphens. For example. JohnDoe@example.com would become /members/johndoeexample-com and Jo.test@example.com would become /members/jo-testexample-com. The members list is available to everyone and (in a default configuration) often without authentication. It is therefore trivial to collect a list of email addresses.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45975 β€Ό

In ListCheck.exe in Acer Care Center 4.x before 4.00.3038, a vulnerability in the loading mechanism of Windows DLLs could allow a local attacker to perform a DLL hijacking attack. This vulnerability is due to incorrect handling of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with local administrator privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46117 β€Ό

jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.page.PageNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0378 β€Ό

Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43334 β€Ό

BuddyBoss Platform through 1.8.0 allows XSS via the Group Name or Group Description field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0379 β€Ό

Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Fantasy Premier League account hack surge prompts plans to introduce extra login checks for football fans πŸ—“οΈ

FA (belatedly) says OK to 2FA

πŸ“– Read

via "The Daily Swig".
⚠ Tax scam emails are alive and well as US tax season starts ⚠

If in doubt, don't give it out! (And don't forget that no reply is often a good reply.)

πŸ“– Read

via "Naked Security".
❌ Linux Bug in All Major Distros: β€˜An Attacker’s Dream Come True’ ❌

The 12-year-old flaw in the sudo-like polkit’s pkexec tool, found in all major Linux distributions, is likely to be exploited in the wild within days.

πŸ“– Read

via "Threat Post".