πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-28367 β€Ό

OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1429 β€Ό

SQL injection in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6. This vulnerability is capable of steal the data

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26672 β€Ό

ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26673 β€Ό

ASUS RT-AX88U has insufficient filtering for special characters in the HTTP header parameter. A remote attacker with general user privilege can exploit this vulnerability to inject JavaScript and perform Stored Cross-Site Scripting (XSS) attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-26674 β€Ό

ASUS RT-AX88U has a Format String vulnerability, which allows an unauthenticated remote attacker to write to arbitrary memory address and perform remote arbitrary code execution, arbitrary system operation or disrupt service.

πŸ“– Read

via "National Vulnerability Database".
❌ Skeletons in the Closet: Security 101 Takes a Backseat to 0-days ❌

Nate Warfield, CTO at Prevailion, discusses the dangers of focusing on zero-day security vulnerabilities, and how security teams are being distracted from the day-to-day work that prevents most breaches.

πŸ“– Read

via "Threat Post".
πŸ‘1
❌ Zero-Trust For All: A Practical Guide ❌

How to use zero-trust architecture effectively in today's modern cloud-dependent infrastructures.

πŸ“– Read

via "Threat Post".
⚠ S3 Ep79: Chrome hole, a bad place for a cybersecurity holiday, and crypto-dodginess [Podcast] ⚠

Do you know your Adam Osborne from your John Osbourne? Your Z80 from your 6502? Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ‘1
β™ŸοΈ Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code β™ŸοΈ

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects. T-Mobile says no customer or government information was stolen in the intrusion. LAPSUS$ is known for stealing data and then demanding a ransom not to publish or sell it. But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing.

πŸ“– Read

via "Krebs on Security".
πŸ—“οΈ Vulnerability in AWS Log4Shell hot patch allowed full host takeover πŸ—“οΈ

Critical security issues found in quick fix

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Creating Cyberattack Resilience in Modern Education Environments πŸ•΄

From increasing cybersecurity awareness in staff, students, and parents to practicing good security hygiene for devices, using endpoint protection, and inspecting network traffic, schools can boost cybersecurity to keep students safe.

πŸ“– Read

via "Dark Reading".
πŸ›  Zeek 4.2.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ‘1
⚠ QNAP warns of new bugs in its Network Attached Storage devices ⚠

Here's what you need to know - plus some sensible advice for all the devices on your home or small biz network!

πŸ“– Read

via "Naked Security".
πŸ•΄ Comcast Business 2021 DDoS Threat Report: DDoS Becomes a Bigger Priority as Multivector Attacks are on the Rise πŸ•΄

Comcast Business mitigated 24,845 multi-vector DDoS attacks in 2021, a 47 percent increase over 2020.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Bitdefender Enhances Premium VPN Service With New Privacy Protection Technologies πŸ•΄

New ad blocker and anti-tracker modules as well as whitelist capabilities provide consumers with secure and private Web browsing.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Contrast Security Introduces Cloud-Native Automation πŸ•΄

New integrations enable Contrast capabilities to be delivered to Red Hat OpenShift users.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CyberUSA, and Superus Careers Launch Cyber Career Exchange Platform πŸ•΄

Collaboration aimed at connecting talent and employers.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Fortress Information Security Receives $125M Strategic Investment from Goldman Sachs Asset Management πŸ•΄

.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Forescout Enhances Continuum Platform With New OT Capabilities πŸ•΄

New capabilities enable improved OT and IoT asset visibility along with data-powered threat detection and cost-effective deployments at scale.

πŸ“– Read

via "Dark Reading".
πŸ•΄ PerimeterX Code Defender Extends Capability To Stop Supply Chain Attacks πŸ•΄

Client-side web app security solution introduces features that give real-time visibility and control of the website attack surface, enabling businesses to stop PII theft and comply with data privacy regulations.

πŸ“– Read

via "Dark Reading".