πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Cloudflare bug bounty program goes public with $3k rewards on offer πŸ—“οΈ

Silicon Valley firm has paid out more than $200k since private program’s 2018 launch

πŸ“– Read

via "The Daily Swig".
⚠ Elementor WordPress plugin has a gaping security hole – update now ⚠

We shouldn't need to say, "Check your inputs!" these days, but we're saying it anyway.

πŸ“– Read

via "Naked Security".
⚠ S3 Ep68: Bugs, scams, privacy… and fonts?! [Podcast + Transcript] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ›  Hydra Network Logon Cracker 9.3 πŸ› 

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

πŸ“– Read

via "Packet Storm Security".
πŸ—“οΈ Bittersweet Symfony: Devs accidentally turn off CSRF protection in PHP framework πŸ—“οΈ

Inadvertent defense downgrade quickly reverted

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-21740 β€Ό

Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21741 β€Ό

Tensorflow is an Open Source Machine Learning Framework. ### Impact An attacker can craft a TFLite model that would trigger a division by zero in the implementation of depthwise convolutions. The parameters of the convolution can be user controlled and are also used within a division operation to determine the size of the padding that needs to be added before applying the convolution. There is no check before this division that the divisor is strictly positive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
❌ Wormhole Crypto Platform: β€˜Funds Are Safe’ After $314M Heist ❌

The popular bridge, which connects Ethereum, Solana blockchain & more, was shelled out by it's-not-saying. Wormhole is trying to negotiate with the attacker.

πŸ“– Read

via "Threat Post".
β™ŸοΈ How Phishers Are Slinking Their Links Into LinkedIn β™ŸοΈ

If you received a link to LinkedIn.com via email, SMS or instant message, would you click it? Spammers, phishers and other ne'er-do-wells are hoping you will, because they've long taken advantage of a marketing feature on the business networking site which lets them create a LinkedIn.com link that bounces your browser to other websites, such as phishing pages that mimic top online brands (but chiefly Linkedin's parent firm Microsoft).

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Big Pharma Finds Patch Management a Bitter Pill πŸ•΄

One-quarter of pharmaceutical manufacturers received a failing grade on patch management, which is a vital step in heading off ransomware attacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Simplifying Zero Trust Security in Healthcare Organizations πŸ•΄

Healthcare organizations are increasingly looking at zero trust to help deter ransomware attacks, safeguard PHI, and prevent downtime.

πŸ“– Read

via "Dark Reading".
πŸ” A Cyber NTSB: DHS Announces Cyber Review Board πŸ”

The board will investigate breaches and vulnerabilities to find out why they happened and how to prevent them from happening again.

πŸ“– Read

via "".
❌ Critical Cisco Bugs Open VPN Routers to Cyberattacks ❌

The company's RV line of small-business routers contains 15 different security vulnerabilities that could enable everything from RCE to corporate network access and denial-of-service – and many have exploits circulating.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-24307 β€Ό

Mastodon before 3.3.2 and 3.4.x before 3.4.6 has incorrect access control because it does not compact incoming signed JSON-LD activities. (JSON-LD signing has been supported since version 1.6.0.)

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft: Multifactor Adoption Remains Low πŸ•΄

New data shows a slow roll to strong authentication for most enterprise Windows systems.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Research From Quantum and ESG Reveals Top Challenges in Data Management πŸ•΄

Unstructured data management, storage complexity and cost remain barriers to adoption, resulting in valuable data being discarded or mismanaged.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT) πŸ•΄

Menlo identified 224% increase in HEAT attacks in the last six months fueling ransomware surge.

πŸ“– Read

via "Dark Reading".
πŸ•΄ DHS Launches Cyber Safety Review Board to Analyze Major Vulnerability Events πŸ•΄

The US Department of Homeland Security has named a 15-member review board to assess significant cybersecurity events and recommend improvements - starting with the Log4J vulnerability.

πŸ“– Read

via "Dark Reading".
❌ Low-Detection Phishing Kits Increasingly Bypass MFA ❌

A growing class of phishing kits – transparent reverse proxy kits – are being used to get past multi-factor authentication using MiTM tactics.

πŸ“– Read

via "Threat Post".
πŸ•΄ Several India-Based Call Centers Indicted by US DoJ πŸ•΄

"Scam robocall" operators face charges for defrauding US citizens.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Future of Cybersecurity: Our Predictions for 2022 πŸ•΄

New technologies and workplace trends are fueling a global explosion in cybercrime. Discover the threats to watch out for in 2022.

πŸ“– Read

via "Dark Reading".