πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ MFA fatigue attacks: Users tricked into allowing device access due to overload of push notifications πŸ—“οΈ

Social engineering technique confuses victims to gain entry to their accounts

πŸ“– Read

via "The Daily Swig".
❌ High-Severity RCE Bug Found in Popular Apache Cassandra Database ❌

On the plus side, only instances with non-standard not recommended configurations are vulnerable. On the downside, those configurations aren't easy to track down, and it's easy as pie to exploit.

πŸ“– Read

via "Threat Post".
❌ Critical VMware Bugs Open ESXi, Fusion & Workstation to Attackers ❌

A group of five security vulnerabilities could lead to a range of bad outcomes for virtual-machine enthusiasts, including command execution and DoS.

πŸ“– Read

via "Threat Post".
β™ŸοΈ Red Cross Hack Linked to Iranian Influence Operation? β™ŸοΈ

A network intrusion at the International Committee for the Red Cross (ICRC) in January led to the theft of personal information on more than 500,000 people receiving assistance from the group. KrebsOnSecurity has learned that the email address used by a cybercriminal actor who offered to sell the stolen ICRC data also was used to register multiple domain names the FBI says are tied to a sprawling media influence operation originating from Iran.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Where AI Falls Down in Cybersecurity πŸ•΄

Almost every cybersecurity product claims to incorporate AI. Sometimes, though, that's a mirage.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-26726 β€Ό

A remote code execution vulnerability affecting a Valmet DNA service listening on TCP port 1517, allows an attacker to execute commands with SYSTEM privileges This issue affects: Valmet DNA versions from Collection 2012 until Collection 2021.

πŸ“– Read

via "National Vulnerability Database".
⚠ VMWare fixes holes that could allow virtual machine escapes ⚠

Hats off to VMWare for not using weasel words: "When should you act?" Immediately...

πŸ“– Read

via "Naked Security".
πŸ•΄ Laminar Announces General Availability of Cloud Data Security Platform πŸ•΄

Solution monitors and protects public cloud data.

πŸ“– Read

via "Dark Reading".
πŸ•΄ DoD Awards Attivo Networks Contract for Ransomware Mitigation πŸ•΄

Contract extends Attivo’s strategic support to the three major branches of the DoD – Air Force, Army, and Navy.

πŸ“– Read

via "Dark Reading".
πŸ•΄ SANS Institute Launches Cybersecurity Education Scholarship for HBCU Students and Alumni πŸ•΄

Applications will be open throughout all Black History Month and accepted until March 1, 2022.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How to Fight the Novel Software Supply Chain Attacks of Tomorrow πŸ•΄

In the past year, attackers have focused on the lucrative supply chain. Organizations need to defend against such attacks, even inside their perimeters.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Pixelating Text Leads to Information Leakage, Warns Firm πŸ•΄

Blurring text isn't enough to obscure sensitive information. An offensive-security firm releases a tool showing how information can still be exposed.

πŸ“– Read

via "Dark Reading".
πŸ” Semiconductor Firm Again Alleges IP Theft πŸ”

The company has defended its confidential and proprietary information and trade secrets in the past.

πŸ“– Read

via "".
β€Ό CVE-2020-6920 β€Ό

Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23190 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21966 β€Ό

An information disclosure vulnerability exists in the HTTP Server /ping.html functionality of Texas Instruments CC3200 SimpleLink Solution NWP 2.9.0.0. A specially-crafted HTTP request can lead to an uninitialized read. An attacker can send an HTTP request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23195 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23193 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3648 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3530. Reason: This candidate is a reservation duplicate of CVE-2021-3530. Notes: All CVE users should reference CVE-2021-3530 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39298 β€Ό

Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23188 β€Ό

Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by a buffer overflow vulnerability due to insecure handling of a crafted malicious file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted malicious file in Illustrator.

πŸ“– Read

via "National Vulnerability Database".