πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ β€œDirty Pipe” Linux kernel bug lets anyone write to any file ⚠

Even read-only files can be written to, leading to a dangerously general purpose elevation-of-privilege attack.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-0482 β€Ό

Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository alextselegidis/easyappointments prior to 1.4.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0896 β€Ό

Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ—“οΈ Government agencies in Ukraine targeted in cyber-attacks deploying MicroBackdoor malware πŸ—“οΈ

A number of state bodies have been attacked since Russia’s invasion began

πŸ“– Read

via "The Daily Swig".
❌ Russian APTs Furiously Phish Ukraine – Google ❌

Also on the rise: DDoS attacks against Ukrainian sites and phishing activity capitalizing on the conflict, with China's Mustang Panda targeting Europe.

πŸ“– Read

via "Threat Post".
πŸ•΄ Zero Trust Can't Stop at the Federal Level πŸ•΄

The federal government must step in to help local and state governments implement zero trust.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Critical Axeda vulnerabilities pose takeover risk to hundreds of IoT devices πŸ—“οΈ

Serious supply chain threat posed to downstream medical devices in particular

πŸ“– Read

via "The Daily Swig".
πŸ›  UFONet 1.8 πŸ› 

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multi-threading, proxies, origin spoofing methods, cache evasion techniques, etc.

πŸ“– Read

via "Packet Storm Security".
❌ Most ServiceNow Instances Misconfigured, Exposed ❌

Customers aren't locking down access correctly, leading to ~70 percent of ServiceNow implementations being vulnerable to malicious data extraction.

πŸ“– Read

via "Threat Post".
β™ŸοΈ Microsoft Patch Tuesday, March 2022 Edition β™ŸοΈ

Microsoft on Tuesday released software updates to plug at least 70 security holes in its Windows operating systems and related software. For the second month running, there are no scary zero-day threats looming for Windows users (that we know of), and relatively few "critical" fixes. And yet we know from experience that attackers are already trying to work out how to turn these patches into a roadmap for exploiting the flaws they fix. Here's a look at the security weaknesses Microsoft says are most likely to be targeted first.

πŸ“– Read

via "Krebs on Security".
πŸ—“οΈ Exploit chain allows security researchers to pwn phone system πŸ—“οΈ

Cloudy with a chance of exploits

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-23265 β€Ό

Microsoft Defender for IoT Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24464 β€Ό

.NET and Visual Studio Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24453 β€Ό

HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22006, CVE-2022-22007, CVE-2022-23301, CVE-2022-24452, CVE-2022-24456.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23286 β€Ό

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-23297 β€Ό

Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24507 β€Ό

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24522 β€Ό

Skype Extension for Chrome Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24520 β€Ό

Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24471, CVE-2022-24517.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24510 β€Ό

Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24461, CVE-2022-24509.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24471 β€Ό

Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24517, CVE-2022-24520.

πŸ“– Read

via "National Vulnerability Database".