πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-1987 β€Ό

Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32265 β€Ό

qDecoder before 12.1.0 does not ensure that the percent character is followed by two hex digits for URL decoding.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1988 β€Ό

Cross-site Scripting (XSS) - Generic in GitHub repository neorazorx/facturascripts prior to 2022.09.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32270 β€Ό

In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32268 β€Ό

StarWind SAN and NAS v0.2 build 1914 allow remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32269 β€Ό

In Real Player 20.0.8.310, the G2 Control allows injection of unsafe javascript: URIs in local HTTP error pages (displayed by Internet Explorer core). This leads to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Second ransomware group attacks Costa Rica πŸ“’

The country’s health service has had its systems affected by the new attack

πŸ“– Read

via "ITPro".
πŸ“’ Zscaler and Siemens team up to provide all-in-one digital transformation solution πŸ“’

Zscaler-powered zero trust OT security platform is now available globally via Siemens

πŸ“– Read

via "ITPro".
πŸ“’ GitHub Enterprise Server 3.5 is equipped with a horde of new security protections πŸ“’

Admins are also given more controls to ensure the smooth running of servers, be it on-prem or in the cloud

πŸ“– Read

via "ITPro".
πŸ“’ What is your digital footprint? πŸ“’

Your digital footprint is always growing – so we explore how you can keep it under control

πŸ“– Read

via "ITPro".
πŸ“’ Russian Killnet cyber attacks begin on Italian-linked businesses πŸ“’

Italy's cyber security authority issued a warning to all public and private sector organisations with links to the country to prepare for an increased number of cyber attacks from the pro-Russian hackers

πŸ“– Read

via "ITPro".
πŸ“’ WithSecure CTO: Industry needs to do a better job of targeting ransomware supply chains πŸ“’

The centralisation of services and tools for hackers should represent a point of vulnerability for those fighting cyber crime

πŸ“– Read

via "ITPro".
πŸ“’ Chinese hackers exploit Microsoft zero-day as list of vulnerable Office products grows πŸ“’

Microsoft has published a support guide and temporary workarounds for IT admins to mitigate the threat

πŸ“– Read

via "ITPro".
πŸ“’ What makes for the most deceptive phishing attacks? πŸ“’

Phishing attacks are evolving to circumvent protective measures. What can businesses do to ensure they don’t succeed?

πŸ“– Read

via "ITPro".
πŸ“’ Microsoft Windows Defender review: An ideal (if unfriendly) business security solution πŸ“’

Central management puts Defender head and shoulders above other free options; the fact that it's already deployed doesn't hurt either

πŸ“– Read

via "ITPro".
πŸ“’ India backtracks on biometric ID system warning πŸ“’

Despite alerting citizens to problems with the system, it has now withdrawn the warning two days after its publication

πŸ“– Read

via "ITPro".
πŸ“’ Fresh Microsoft Office zero-day executes code on fully patched applications πŸ“’

Malicious documents saved in Rich Text Format are especially concerning since they can execute code without even being opened

πŸ“– Read

via "ITPro".
πŸ“’ How to turn on Windows Defender πŸ“’

Find out how to switch on Windows Defender in Windows 10 and older versions of the OS

πŸ“– Read

via "ITPro".
❌ Evil Corp Pivots LockBit to Dodge U.S. Sanctions ❌

The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity.

πŸ“– Read

via "Threat Post".
πŸ‘1
πŸ•΄ For Ransomware, Speed Matters πŸ•΄

Someone interested in putting together a ransomware campaign has to consider several factors. The LockBit group touts its speed over competing families to attract potential buyers for its ransowmare-as-a-service.

πŸ“– Read

via "Dark Reading".
❌ Old Hacks Die Hard: Ransomware, Social Engineering Top Verizon DBIR Threats – Again ❌

Deja-Vu data from this year's DBIR report feels like we are stuck in the movie 'Groundhog Day.'

πŸ“– Read

via "Threat Post".