πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Microsoft Help Files Disguise Vidar Malware ❌

Attackers are hiding interesting malware in a boring place, hoping victims won’t bother to look.

πŸ“– Read

via "Threat Post".
❌ Tax-Season Scammers Spoof Fintechs, Including Stash, Public ❌

Threat actors are impersonating such wildly popular personal-finance apps (which are used more than social media or streaming services) to try to fool people into giving up their credentials.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ FBI Most Wanted Russian national accused of running dark web marketplace πŸ—“οΈ

The 23-year-old has been indicted for operating a successful carding ring

πŸ“– Read

via "The Daily Swig".
⚠ S3 Ep75: Okta hack, CryptoRom, OpenSSL, and CafePress [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ•΄ What the Conti Ransomware Group Data Leak Tells Us πŸ•΄

Knowing the inner workings of Conti will not only help ransomware negotiators but also help organizations to better handle a ransomware attack when it happens.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-43700 β€Ό

An issue was discovered in ApiManager 1.1. there is sql injection vulnerability that can use in /index.php?act=api&tag=8.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1052 β€Ό

Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6.

πŸ“– Read

via "National Vulnerability Database".
❌ Chinese APT Combines Fresh Hodur RAT with Complex Anti-Detection ❌

Mustang Panda's already sophisticated cyberespionage campaign has matured even further with the introduction of a brand-new PlugX RAT variant.

πŸ“– Read

via "Threat Post".
πŸ›  Wireshark Analyzer 3.6.3 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ—“οΈ Microweber developers resolve XSS vulnerability in CMS software πŸ—“οΈ

Content filtering shortcomings led to web security flaw

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-0551 β€Ό

Improper Input Validation vulnerability in project file upload in Nozomi Networks Guardian and CMC allows an authenticated attacker with admin or import manager roles to execute unattended commands on the appliance using web server user privileges. This issue affects: Nozomi Networks Guardian versions prior to 22.0.0. Nozomi Networks CMC versions prior to 22.0.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43659 β€Ό

In halo 1.4.14, the function point of uploading the avatar, any file can be uploaded, such as uploading an HTML file, which will cause a stored XSS vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0955 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/data-hub prior to 1.2.4.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1058 β€Ό

Open Redirect on login in GitHub repository go-gitea/gitea prior to 1.16.5.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39491 β€Ό

A Cross Site Scripting (XSS) vulnerability exists in Yogesh Ojha reNgine v1.0 via the Scan Engine name file in the Scan Engine deletion confirmation modal box . .

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0550 β€Ό

Improper Input Validation vulnerability in custom report logo upload in Nozomi Networks Guardian, and CMC allows an authenticated attacker with admin or report manager roles to execute unattended commands on the appliance using web server user privileges. This issue affects: Nozomi Networks Guardian versions prior to 22.0.0. Nozomi Networks CMC versions prior to 22.0.0.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ APIs & the Software Supply Chain β€” Evolving Security for Today's Digital Ecosystem πŸ•΄

Securing APIs requires both a "shift left" methodology and "shield right" action.

πŸ“– Read

via "Dark Reading".
❌ HubSpot Data Breach Ripples Through Crytocurrency Industry ❌

~30 crypto companies were affected, including BlockFi, Swan Bitcoin and NYDIG, providing an uncomfortable reminder about how much data CRM systems snarf up.

πŸ“– Read

via "Threat Post".
πŸ•΄ For MSPs, Next-Gen Email Security Is a Must πŸ•΄

Stay one step ahead of the constantly evolving cyber threats with the right MSP email security solution. Discover how to evaluate and select the best service and solutions for your clients.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-21820 β€Ό

NVIDIA DCGM contains a vulnerability in nvhostengine, where a network user can cause detection of error conditions without action, which may lead to limited code execution, some denial of service, escalation of privileges, and limited impacts to both data confidentiality and integrity.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26629 β€Ό

An Access Control vulnerability exists in SoroushPlus+ Messenger 1.0.30 in the Lock Screen Security Feature function due to insufficient permissions and privileges, which allows a malicious attacker bypass the lock screen function.

πŸ“– Read

via "National Vulnerability Database".