πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2017-20035 β€Ό

A vulnerability, which was classified as problematic, has been found in PHPList 3.2.6. This issue affects some unknown processing of the file /lists/admin/ of the component Subscribe. The manipulation leads to cross site scripting (Persistent). The attack may be initiated remotely. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42811 β€Ό

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in SafeNet KeySecure allows an authenticated user to read arbitrary files from the underlying system on which the product is deployed.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Separate Fujitsu cloud storage vulnerabilities could enable attackers to destroy virtual backups πŸ—“οΈ

Sysadmins should update their installations immediately

πŸ“– Read

via "The Daily Swig".
πŸ•΄ In a Quickly Evolving Landscape, CISOs Shift Their 2022 Priorities πŸ•΄

Cloud migration, DevSecOps, cyber insurance, and more have emerged as important motivators for cybersecurity investment and focus.

πŸ“– Read

via "Dark Reading".
❌ U.S. Water Utilities Prime Cyberattack Target, Experts ❌

Environmentalists and policymakers warn water treatment plants are ripe for attack.

πŸ“– Read

via "Threat Post".
πŸ•΄ How 4 Young Musicians Hacked Sheet Music to Help Fight the Cold War πŸ•΄

In 1985, a group of klezmer musicians from the US rendezvoused with underground dissidents in Tbilisi, Georgia. This is the story of how they pulled it off with homebrew cryptography.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Artificial Intelligence and Security: What You Should Know πŸ•΄

Next-generation AI products learn proactively and identify changes in the networks, users, and databases using "data drift" to adapt to specific threats as they evolve.

πŸ“– Read

via "Dark Reading".
πŸ” Friday Five 6/10 πŸ”

Read up on how Apple is getting ahead of the curve on security, how you could be targeted in a Facebook phishing scam, why a different type of cyberattack could surpass ransomware, and more all in this week’s Friday Five!


πŸ“– Read

via "".
β€Ό CVE-2021-44582 β€Ό

A Privilege Escalation vulnerability exists in Sourcecodester Money Transfer Management System 1.0, which allows a remote malicious user to gain elevated privileges to the Admin role via any URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31788 β€Ό

IdeaLMS 2022 allows SQL injection via the IdeaLMS/ChatRoom/ClassAccessControl/6?isBigBlueButton=0&ClassID= pathname.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44117 β€Ό

A Cross Site Request Forgery (CSRF) vulnerability exists in TheDayLightStudio Fuel CMS 1.5.0 via a POST call to /fuel/sitevariables/delete/4.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32563 β€Ό

An issue was discovered in Couchbase Sync Gateway 3.x before 3.0.2. Admin credentials are not verified when using X.509 client-certificate authentication from Sync Gateway to Couchbase Server. When Sync Gateway is configured to authenticate with Couchbase Server using X.509 client certificates, the admin credentials provided to the Admin REST API are ignored, resulting in privilege escalation for unauthenticated users. The Public REST API is not impacted by this issue. A workaround is to replace X.509 certificate based authentication with Username and Password authentication inside the bootstrap configuration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-27502 β€Ό

RealVNC VNC Server 6.9.0 through 5.1.0 for Windows allows local privilege escalation because an installer repair operation executes %TEMP% files as SYSTEM.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ IBM bolsters cyber security offerings with Randori acquisition πŸ“’

It plans to use the company’s attack surface management and offensive security offerings to strengthen its cloud and AI capabilities

πŸ“– Read

via "ITPro".
πŸ“’ Double extortion ransomware pushes average payments close to $1 million πŸ“’

As the average payment approaches the landmark figure, experts reflect on times when the going rate was just $500

πŸ“– Read

via "ITPro".
πŸ“’ The hybrid work maturity framework πŸ“’

Your roadmap to trusted flexible working

πŸ“– Read

via "ITPro".
πŸ“’ The EU’s Apple App Store crackdown β€˜will fuel cyber attacks’ πŸ“’

Organisations should be encouraged to embrace the β€˜security by Playstation’ approach as much as possible, expert says

πŸ“– Read

via "ITPro".
πŸ“’ Cyber security companies β€˜must remember who the enemies are’ πŸ“’

Tech giants must collaborate more with the wider industry, WithSecure’s CEO urges, as he lays bare European anxieties

πŸ“– Read

via "ITPro".
πŸ“’ Kaspersky Free review: Effective and lightweight – everything you want from a free antivirus solution πŸ“’

It’ll be a real shame if politics means people missing out on this top-class security tool

πŸ“– Read

via "ITPro".
πŸ“’ Cyber criminals are spending longer inside business' networks after the initial breach πŸ“’

Cyber attackers' dwell time is up 36% thanks to initial access brokers and repeat exploitation of Microsoft Exchange vulnerabilities, according to Sophos

πŸ“– Read

via "ITPro".
πŸ“’ Kali Linux team announces free cyber security training delivered live on Twitch πŸ“’

The brand-new initiative is aimed at reaching more aspiring certified pen-testers through twice-weekly livestreamed lessons

πŸ“– Read

via "ITPro".