πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-26205 β€Ό

Marky commit 3686565726c65756e was discovered to contain a remote code execution (RCE) vulnerability via the Display text fields. This vulnerability allows attackers to execute arbitrary code via injection of a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27948 β€Ό

Certain Tesla vehicles through 2022-03-26 allow attackers to open the charging port via a 315 MHz RF signal containing a fixed sequence of approximately one hundred symbols.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26245 β€Ό

Falcon-plus v0.3 was discovered to contain a SQL injection vulnerability via the parameter grpName in /config/service/host.go.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1106 β€Ό

use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ F-Secure launches WithSecure, spinning off entire enterprise portfolio πŸ“’

After years of trying to integrate business and consumer streams, F-Secure signals a complete split will help both new entities focus on their customers and industry relevance

πŸ“– Read

via "ITPro".
πŸ“’ The keys to catching a cyber crook πŸ“’

Why greed, carelessness and an itch for glory are highly exploitable chinks in a cyber criminal's armour

πŸ“– Read

via "ITPro".
πŸ“’ EU proposes new bloc-wide cyber security regulations πŸ“’

The Computer Emergency Response Team for the EU institutions, bodies, offices, and agencies (CERT-EU) will be renamed as the β€˜Cybersecurity Centre'

πŸ“– Read

via "ITPro".
πŸ“’ Linux botnet spreads using Log4Shell flaw πŸ“’

The malware uses DNS tunnelling to communicate with its C2 control server

πŸ“– Read

via "ITPro".
πŸ“’ How a platform approach to security monitoring initiatives adds value πŸ“’

Integration, orchestration, analytics, automation, and the need for speed

πŸ“– Read

via "ITPro".
πŸ“’ Hackers spotted using CAPTCHAs to dodge email security scanners πŸ“’

The technique allows hackers to hide malicious links in HTML files

πŸ“– Read

via "ITPro".
πŸ“’ Okta confirms investigation into alleged LAPSUS$ security breach πŸ“’

Businesses are now on high alert as the hackers claim to have had full admin access to the back-end of identity and authentication provider Okta for at least two months

πŸ“– Read

via "ITPro".
πŸ“’ Ransomware strikes Scottish mental health charity πŸ“’

The RansomEXX cyber criminals have claimed responsibility for the hack which led to more than 12GB of sensitive data being leaked to the dark web

πŸ“– Read

via "ITPro".
πŸ“’ EU and US reach agreement on Privacy Shield replacement πŸ“’

Privacy campaigner Max Schrems suggests the deal amounts to a "patchwork approach" that will ultimately fail

πŸ“– Read

via "ITPro".
πŸ“’ McAfee Enterprise’s SSE business rebrands to Skyhigh Security πŸ“’

The new organisation will provide a β€œcomprehensive and converged” approach to data security, Symphony Technology Group says

πŸ“– Read

via "ITPro".
πŸ“’ Open source dev attacked for spreading data-wiping 'protestware' πŸ“’

Developer denies wiping users' drives in spite of detailed code analysis

πŸ“– Read

via "ITPro".
πŸ“’ Biden urges US businesses to prepare for Russian cyber attacks πŸ“’

The president has urged critical infrastructure owners to accelerate efforts to lock their digital doors

πŸ“– Read

via "ITPro".
πŸ‘Ž1
πŸ“’ How to secure business printers πŸ“’

Your office printer is a juicy target for hackers, so what can you do to secure it?

πŸ“– Read

via "ITPro".
πŸ“’ Microsoft Defender drops "downpour" of false ransomware alerts on customers πŸ“’

System administrators made numerous reports of false-positive results being flagged for seemingly innocuous files and behaviours on Wednesday

πŸ“– Read

via "ITPro".
πŸ“’ Avast to acquire identity services provider SecureKey πŸ“’

The acquisition will add to Avast’s privacy-focused identity product and services portfolio

πŸ“– Read

via "ITPro".
πŸ“’ Western Digital flaw allows hackers to access restricted files πŸ“’

The proprietary file explorer app contained directory traversal bug, says storage vendor

πŸ“– Read

via "ITPro".
πŸ“’ Google exposes 'uniquely personal' access broker behind worst Conti, FIN12 ransomware attacks πŸ“’

Investigation unveils the inner workings of one access broker that helped two of the most-hated ransomware gangs in history

πŸ“– Read

via "ITPro".