πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Middleboxes now being used for DDoS attacks in the wild, Akamai finds πŸ—“οΈ

Malicious actors are starting to add TCP middlebox reflection to their arsenal

πŸ“– Read

via "The Daily Swig".
❌ Qakbot Botnet Sprouts Fangs, Injects Malware into Email Threads ❌

The ever-shifting, ever-more-powerful malware is now hijacking email threads to download malicious DLLs that inject password-stealing code into webpages, among other foul things.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-0895 β€Ό

Static Code Injection in GitHub repository microweber/microweber prior to 1.3.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ What Security Controls Do I Need for My Kubernetes Cluster? πŸ•΄

This Tech Tip offers some security controls to embed in your organization's CI/CD pipeline to protect Kubernetes clusters and corporate networks.

πŸ“– Read

via "Dark Reading".
❌ Multi-Ransomwared Victims Have It Coming–Podcast ❌

Let's blame the victim. IT decision makers' confidence about security doesn't jibe with their concession that repeated incidents are their own fault, says ExtraHop's Jamie Moles.

πŸ“– Read

via "Threat Post".
πŸ” RagnarLocker Ransomware Connected to Hacks at 52 Organizations πŸ”

New guidance from the FBI contains IOCs and technical details on how the ransomware spreads.

πŸ“– Read

via "".
❌ Russia May Use Ransomware Payouts to Avoid Sanctions ❌

FinCEN warns financial institutions to beware of unusual cryptocurrency payments or illegal transactions Russia may use to evade restrictions imposed due to its invasion of Ukraine.

πŸ“– Read

via "Threat Post".
πŸ•΄ Log4j and Livestock Apps: APT41 Wages Persistent Cyberattack Campaign on US Government πŸ•΄

The group's attack methods have included exploits for a zero-day vulnerability in a livestock-tracking apps as well as for the Apache Log4 flaw.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ 1Password increases bug bounty reward to $1 million πŸ—“οΈ

Researchers offered record incentive for vulnerabilities found on Bugcrowd programs

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Why You Should Be Using CISA's Catalog of Exploited Vulns πŸ•΄

It's a great starting point for organizations that want to ride the wave of risk-based vulnerability management rather than drowning beneath it.

πŸ“– Read

via "Dark Reading".
❌ Most Orgs Would Take Security Bugs Over Ethical Hacking Help ❌

A new survey suggests that security is becoming more important for enterprises, but they’re still falling back on old "security by obscurity" ways.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ RagnarLocker ransomware struck 52 critical infrastructure entities within two years – FBI πŸ—“οΈ

Agency issues mitigation advice to help organizations tighten network defenses

πŸ“– Read

via "The Daily Swig".
πŸ‘1
⚠ S3 Ep73: Ransomware with a difference, dirty Linux pipes, and much more [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-0905 β€Ό

Improper Authorization in GitHub repository go-gitea/gitea prior to 1.16.4.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0906 β€Ό

Unrestricted file upload leads to stored XSS in GitHub repository microweber/microweber prior to 1.1.12.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Falco 0.31.1 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Cyber Insurance and Business Risk: How the Relationship Is Changing Reinsurance & Policy Guidance πŸ•΄

While cyber insurance will continue to exist, it will cost more and cover less β€” and that's changing the risk your company faces.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-0725 β€Ό

A flaw was found in KeePass. The vulnerability occurs due to logging the plain text passwords in the system log and leads to an Information Exposure vulnerability. This flaw allows an attacker to interact and read sensitive passwords and logs.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2021-43970 β€Ό

An arbitrary file upload vulnerability exists in albumimages.jsp in Quicklert for Digium 10.0.0 (1043) via a .mp3;.jsp filename for a file that begins with audio data bytes. It allows an authenticated (low privileged) attacker to execute remote code on the target server within the context of application's permissions (SYSTEM).

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2021-34122 β€Ό

The function bitstr_tell at bitstr.c in ffjpeg commit 4ab404e has a NULL pointer dereference.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-14112 β€Ό

Information Leak Vulnerability exists in the Xiaomi Router AX6000. The vulnerability is caused by incorrect routing configuration. Attackers can exploit this vulnerability to download part of the files in Xiaomi Router AX6000.

πŸ“– Read

via "National Vulnerability Database".