πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ After a Busy December, Attacks on Log4J Vulnerability Dropped πŸ•΄

While attackers and researchers shift their attention to the next new vulnerability, security teams make sure they finish patching vulnerable Log4j versions in their applications and services .

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Utah privacy bill places tighter controls on consumer data πŸ—“οΈ

Policymakers move forward with new data privacy legislation

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Why the World Needs a Global Collective Cyber Defense πŸ•΄

This sort of approach would enable cross-company and cross-sector threat information sharing, an effort that would allow companies to easily turn data into actionable insights.

πŸ“– Read

via "Dark Reading".
🀯1
β€Ό CVE-2022-0754 β€Ό

SQL Injection in GitHub repository salesagility/suitecrm prior to 7.12.5.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0755 β€Ό

Improper Access Control in GitHub repository salesagility/suitecrm prior to 7.12.5.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0756 β€Ό

Improper Authorization in GitHub repository salesagility/suitecrm prior to 7.12.5.

πŸ“– Read

via "National Vulnerability Database".
❌ Critical Firefox Zero-Day Bugs Allow RCE, Sandbox Escape ❌

Both vulnerabilities are use-after-free issues in Mozilla's popular web browser.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Fresh flaws in Facebook Canvas earn bug bounty hunter a second payday πŸ—“οΈ

Next-level account takeover

πŸ“– Read

via "The Daily Swig".
❌ Nvidia’s Stolen Code-Signing Certs Used to Sign Malware ❌

Nvidia certificates are being used to sign malware, enabling malicious programs to pose as legitimate and slide past security safeguards on Windows machines.

πŸ“– Read

via "Threat Post".
πŸ•΄ Industrial Systems See More Vulnerabilities, Greater Threat πŸ•΄

The makers of operational technology and connected devices saw reported vulnerabilities grow by half in 2021, but other trends may be more disturbing.

πŸ“– Read

via "Dark Reading".
❌ Samsung Confirms Lapsus$ Ransomware Hit, Source Code Leak ❌

The move comes just a week after GPU-maker NVIDIA was hit by Lapsus$ and every employee credential was leaked.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-38989 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212951.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22351 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged trusted host user to exploit a vulnerability in the nimsh daemon to cause a denial of service in the nimsh daemon on another trusted host. IBM X-Force ID: 220396

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38988 β€Ό

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212950.

πŸ“– Read

via "National Vulnerability Database".
πŸ” SEC Mulling New Cybersecurity Rules πŸ”

Recently proposed SEC cybersecurity rules could affect how U.S. securities markets, including issuers, registrants, and service providers, approach compliance efforts.

πŸ“– Read

via "".
❌ Novel Attack Turns Amazon Devices Against Themselves ❌

Researchers have discovered how to remotely manipulate the Amazon Echo through its own speakers.

πŸ“– Read

via "Threat Post".
πŸ•΄ Name That Edge Toon: Animal Instincts πŸ•΄

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Google in Talks to Acquire Mandiant πŸ•΄

Last month, Microsoft was interested in buying Mandiant. Now, it's Google that is looking at a deal to boost Google Cloud.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ Trio of Vendors Offer Free Services to Organizations at Risk of Russian Cyberattacks πŸ•΄

CrowdStrike, Cloudflare, and Ping Identity have teamed up with tools and services for the healthcare, power, and water industries as a way to quickly bolster their security on several fronts.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-24737 β€Ό

HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. Before 3.1.0, HTTPie didnΓƒΒ’Γ’β€šΒ¬Γ‹Ε“t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website. Users are advised to upgrade. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".