πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-32998 β€Ό

The cryptoasset-data-downloader package in PyPI v1.0.0 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34059 β€Ό

The Sixfab-Tool in PyPI v0.0.2 to v0.0.3 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34054 β€Ό

The Perdido package in PyPI v0.0.1 to v0.0.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32999 β€Ό

The cloudlabeling package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32997 β€Ό

The RootInteractive package in PyPI v0.0.5 to v0.0.19b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-33001 β€Ό

The AAmiles package in PyPI v0.1.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Threat Intelligence Services Are Universally Valued by IT Staff πŸ•΄

Most of those surveyed are concerned about AI-based attacks and deepfakes, but suggest that their organization is ready.

πŸ“– Read

via "Dark Reading".
🀯1
πŸ“’ 'Embrace PowerShell for better security', say UK, US, NZ cyber authorities πŸ“’

The powerful automation and IT administrative tool has been used by hackers as an attack tool, but proper configuration can take the power out of their hands

πŸ“– Read

via "ITPro".
πŸ“’ Delivery firm Yodel disrupted by cyber attack πŸ“’

The company confirmed that some services are down but deliveries are continuing, though specific details are currently unknown

πŸ“– Read

via "ITPro".
πŸ“’ UK government opts against regulation for cyber security standards πŸ“’

UK Cyber Security Council will move ahead with its planned chartered standards, with the government to monitor its adoption

πŸ“– Read

via "ITPro".
πŸ“’ Best free malware removal tools 2022 πŸ“’

Worried your device is infected? Here are the tools you need to get rid of malicious software

πŸ“– Read

via "ITPro".
πŸ“’ Security BSides commits to greater conference diversity after speaker backlash πŸ“’

A surprise booking of a divisive social engineer prompted a number of cyber security experts to pull out of BSides Cleveland

πŸ“– Read

via "ITPro".
πŸ“’ Cloudflare fixes outage that knocked major web services offline πŸ“’

Online services such as Nord VPN, Shopify, and Steam were all inaccessible by users in most regions

πŸ“– Read

via "ITPro".
πŸ“’ How to react to a data breach πŸ“’

Would you know what to do if an online attacker got their hands on your data? We outline the first steps you should take following a security breach

πŸ“– Read

via "ITPro".
πŸ“’ IT Pro News in Review: UK tech raises $16bn, Microsoft acquires Miburo, largest DDoS attack mitigated πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
πŸ“’ SolarWinds details 'next generation' software development process πŸ“’

The open source approach, which will be shared with the wider community, is a direct response to the SUNBURST cyber attack in 2020

πŸ“– Read

via "ITPro".
πŸ“’ Avira Free Security review: An effective antimalware suite, but heavy on the marketing πŸ“’

It’s hard to fully appreciate Avira’s malware protection when the packaging feels so manipulative

πŸ“– Read

via "ITPro".
πŸ“’ BRATA malware has evolved to target online banking across Europe, researchers warn πŸ“’

The new variant can now access SMS, GPS, and device control to better steal financial data

πŸ“– Read

via "ITPro".
πŸ“’ Okta sets aside $1 million to support cyber security training for non-profits πŸ“’

One of the projects receiving a grant will help civil society organisations in Ukraine to strengthen their cyber security

πŸ“– Read

via "ITPro".
πŸ“’ Quantum is 'the future of AWS system security', Amazon claims πŸ“’

With third major quantum investment, AWS sets stage for next decade of network infrastructure

πŸ“– Read

via "ITPro".
πŸ“’ How secure is Gmail? πŸ“’

The practical steps you should take to secure your Gmail account, from implementing 2FA to performing regular checkups

πŸ“– Read

via "ITPro".