πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Adafruit suffers GitHub data breach – don’t let this happen to you ⚠

Training data stashed in GitHub by mistake... unfortunately, it was *real* data

πŸ“– Read

via "Naked Security".
⚠ β€œDirty Pipe” Linux kernel bug lets anyone to write to any file ⚠

Even read-only files can be written to, leading to a dangerously general purpose elevation-of-privilege attack.

πŸ“– Read

via "Naked Security".
πŸ•΄ Google to Buy Mandiant, Aims to Automate Security Response πŸ•΄

In a deal worth $5.4 billion, Google would expand its security portfolio with managed detection and response (MDR) and threat intelligence, with an increasing focus on automation.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Dark Reading Reflects on Breaking the Bias for International Women's Day πŸ•΄

A look at how far the information security industry has come - and how far it still has to go.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-41239 β€Ό

Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41181 β€Ό

Nextcloud talk is a self hosting messaging service. In versions prior to 12.3.0 the Nextcloud Android Talk application did not properly detect the lockscreen state when a call was incoming. If an attacker got physical access to the locked phone, and the victim received a phone call the attacker could gain access to the chat messages and files of the user. It is recommended that the Nextcloud Android Talk App is upgraded to 12.3.0. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41180 β€Ό

Nextcloud talk is a self hosting messaging service. In versions prior 12.1.2 an attacker is able to control the link of a geolocation preview in the Nextcloud Talk application due to a lack of validation on the link. This could result in an open-redirect, but required user interaction. This only affected users of the Android Talk client. It is recommended that the Nextcloud Talk App is upgraded to 12.1.2. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Improve security and compliance πŸ“’

Adopting an effective security and compliance risk management approach

πŸ“– Read

via "ITPro".
πŸ“’ Microsoft suspends sales in Russia amid mass tech boycott πŸ“’

Russia is also limiting its citizens’ access to apps that are in any way supporting Ukraine

πŸ“– Read

via "ITPro".
πŸ“’ Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive πŸ“’

So, you want to be a hacker? We share the best advice and resources for getting started

πŸ“– Read

via "ITPro".
πŸ“’ Nvidia hackers leak 190GB of data allegedly stolen from Samsung πŸ“’

The LAPSUS$ hacking group claims to have breached the tech giant to steal internal data and source code

πŸ“– Read

via "ITPro".
πŸ“’ Mozilla patches two Firefox zero-day vulnerabilities πŸ“’

Memory bugs fixed in Firefox desktop and mobile browsers along with Mozilla's Thunderbird client

πŸ“– Read

via "ITPro".
πŸ“’ Anonymous hijacks Russian broadcasts with footage of Ukraine war πŸ“’

The hacking group said it managed to manipulate the broadcasts of three major Russian state-backed media organisations

πŸ“– Read

via "ITPro".
πŸ“’ Leaked Nvidia certificates used to sign malware bypassing Windows detection πŸ“’

Windows admins are advised to implement custom policies to avoid seemingly legitimate malware making its way into corporate environments

πŸ“– Read

via "ITPro".
πŸ•΄ Even 'Perfect' APIs Can be Abused πŸ•΄

Broad-scale API abuse is occurring every day as businesses make their data available to trading partners β€” and even the public.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-24713 β€Ό

regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24715 β€Ό

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41241 β€Ό

Nextcloud server is a self hosted system designed to provide cloud style services. The groupfolders application for Nextcloud allows sharing a folder with a group of people. In addition, it allows setting "advanced permissions" on subfolders, for example, a user could be granted access to the groupfolder but not specific subfolders. Due to a lacking permission check in affected versions, a user could still access these subfolders by copying the groupfolder to another location. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the "groupfolders" application in the admin settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24716 β€Ό

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24714 β€Ό

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Installations of Icinga 2 with the IDO writer enabled are affected. If you use service custom variables in role restrictions, and you regularly decommission service objects, users with said roles may still have access to a collection of content. Note that this only applies if a role has implicitly permitted access to hosts, due to permitted access to at least one of their services. If access to a host is permitted by other means, no sensible information has been disclosed to unauthorized users. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2.

πŸ“– Read

via "National Vulnerability Database".
❌ Microsoft Addresses 3 Zero-Days & 3 Critical Bugs for March Patch Tuesday ❌

The computing giant patched 71 security vulnerabilities in an uncharacteristically light scheduled update, including its first Xbox bug.

πŸ“– Read

via "Threat Post".
πŸ‘1