πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2016-20013 β€Ό

sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24979 β€Ό

An issue was discovered in the Varnishcache extension before 2.0.1 for TYPO3. The Edge Site Includes (ESI) content element renderer component does not include an access check. This allows an unauthenticated user to render various content elements, resulting in insecure direct object reference (IDOR), with the potential of exposing internal content elements.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25256 β€Ό

SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0678 β€Ό

Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0630 β€Ό

Out-of-bounds Read in Homebrew mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0632 β€Ό

NULL Pointer Dereference in Homebrew mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0690 β€Ό

Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2016-1239 β€Ό

duck before 0.10 did not properly handle loading of untrusted code from the current directory..

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ IT Pro News In Review: Nvidia breaks off Arm deal, FCDO security attack, Microsoft to disable VBA πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
πŸ“’ Moving forward in a work from anywhere world πŸ“’

A gorilla guide

πŸ“– Read

via "ITPro".
πŸ“’ Texas sues Facebook for misusing facial recognition data πŸ“’

State wants up to $25,000 per alleged violation for discontinued program

πŸ“– Read

via "ITPro".
πŸ“’ Mid-sized businesses on hackers’ 2022 hit list, cyber agencies warn πŸ“’

Cyber criminals are "shifting away from big-game hunting", say FBI and NCSC

πŸ“– Read

via "ITPro".
πŸ“’ Google doubles bug bounty rewards for Linux, Kubernetes exploits πŸ“’

The increased rewards are said to align better with the community's expectations of a bug bounty programme of this kind

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ Apple users told to update their devices to fix critical WebKit flaw πŸ“’

The security flaw allowed code execution on a range of devices and represents the third major vulnerability to be patched by Apple this year

πŸ“– Read

via "ITPro".
πŸ“’ Google and competition watchdog agree on rules governing cookie policy changes πŸ“’

The news comes as the European Publishers Council (EPC) issued a European Commission antitrust complaint against Google

πŸ“– Read

via "ITPro".
πŸ“’ Coinbase Super Bowl marketing stunt prompts debate over QR code security πŸ“’

Experts are torn over QR codes and whether the cyber security threat they theoretically present is actually enough to warrant genuine concern in real-world scenarios

πŸ“– Read

via "ITPro".
πŸ“’ Google Chrome update fixes zero-day under active exploitation πŸ“’

Google releases a fresh wave of patches for severe vulnerabilities that could facilitate code execution and system takeover via Google Chrome

πŸ“– Read

via "ITPro".
πŸ“’ Data protection policies and procedures πŸ“’

Why your company needs them, and what they should include

πŸ“– Read

via "ITPro".
πŸ“’ Hackers to face 25 years in jail for cyber attacks on Australia's national infrastructure πŸ“’

The proposals aim to update current laws to account for cyber threats like ransomware

πŸ“– Read

via "ITPro".
πŸ“’ Cyber security startups pull in record-breaking investment in 2021 πŸ“’

Data suggests high-profile data breaches led to a greater number of transactions valued at $100 million or more

πŸ“– Read

via "ITPro".