πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Zero-Trust For All: A Practical Guide ❌

How to use zero-trust architecture effectively in today's modern cloud-dependent infrastructures.

πŸ“– Read

via "Threat Post".
⚠ S3 Ep79: Chrome hole, a bad place for a cybersecurity holiday, and crypto-dodginess [Podcast] ⚠

Do you know your Adam Osborne from your John Osbourne? Your Z80 from your 6502? Latest episode - listen now!

πŸ“– Read

via "Naked Security".
πŸ‘1
β™ŸοΈ Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code β™ŸοΈ

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects. T-Mobile says no customer or government information was stolen in the intrusion. LAPSUS$ is known for stealing data and then demanding a ransom not to publish or sell it. But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing.

πŸ“– Read

via "Krebs on Security".
πŸ—“οΈ Vulnerability in AWS Log4Shell hot patch allowed full host takeover πŸ—“οΈ

Critical security issues found in quick fix

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Creating Cyberattack Resilience in Modern Education Environments πŸ•΄

From increasing cybersecurity awareness in staff, students, and parents to practicing good security hygiene for devices, using endpoint protection, and inspecting network traffic, schools can boost cybersecurity to keep students safe.

πŸ“– Read

via "Dark Reading".
πŸ›  Zeek 4.2.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ‘1
⚠ QNAP warns of new bugs in its Network Attached Storage devices ⚠

Here's what you need to know - plus some sensible advice for all the devices on your home or small biz network!

πŸ“– Read

via "Naked Security".
πŸ•΄ Comcast Business 2021 DDoS Threat Report: DDoS Becomes a Bigger Priority as Multivector Attacks are on the Rise πŸ•΄

Comcast Business mitigated 24,845 multi-vector DDoS attacks in 2021, a 47 percent increase over 2020.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Bitdefender Enhances Premium VPN Service With New Privacy Protection Technologies πŸ•΄

New ad blocker and anti-tracker modules as well as whitelist capabilities provide consumers with secure and private Web browsing.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Contrast Security Introduces Cloud-Native Automation πŸ•΄

New integrations enable Contrast capabilities to be delivered to Red Hat OpenShift users.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CyberUSA, and Superus Careers Launch Cyber Career Exchange Platform πŸ•΄

Collaboration aimed at connecting talent and employers.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Fortress Information Security Receives $125M Strategic Investment from Goldman Sachs Asset Management πŸ•΄

.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Forescout Enhances Continuum Platform With New OT Capabilities πŸ•΄

New capabilities enable improved OT and IoT asset visibility along with data-powered threat detection and cost-effective deployments at scale.

πŸ“– Read

via "Dark Reading".
πŸ•΄ PerimeterX Code Defender Extends Capability To Stop Supply Chain Attacks πŸ•΄

Client-side web app security solution introduces features that give real-time visibility and control of the website attack surface, enabling businesses to stop PII theft and comply with data privacy regulations.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-32929 β€Ό

All versions of Uffizio GPS Tracker may allow an attacker to perform unintended actions on behalf of a user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28074 β€Ό

Halo-1.5.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via \admin\index.html#/system/tools.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27404 β€Ό

FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27406 β€Ό

FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32927 β€Ό

An attacker may be able to inject client-side JavaScript code on multiple instances within all versions of Uffizio GPS Tracker.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1437 β€Ό

Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.

πŸ“– Read

via "National Vulnerability Database".