πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ 3 Cyber Threats Resulting From Today's Technology Choices to Hit Businesses by 2024 πŸ•΄

Companies need to consider the cost to disengage from the cloud along with proactive risk management that looks at governance issues resulting from heavy use of low- and no-code tools.

πŸ“– Read

via "Dark Reading".
⚠ Canadian cybercriminal pleads guilty to β€œNetWalker” attacks in US ⚠

Bust in Canada, now bust in the USA as well.

πŸ“– Read

via "Naked Security".
πŸ›  OpenSSL Toolkit 1.1.1q πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

πŸ“– Read

via "Packet Storm Security".
πŸ›  C Language Reverse Shell Generator πŸ› 

This is a C language reverse shell generator that is written in Python.

πŸ“– Read

via "Packet Storm Security".
πŸ›  OpenSSL Toolkit 3.0.5 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. The 3.x series is the current major version of OpenSSL.

πŸ“– Read

via "Packet Storm Security".
πŸ›  TripleCross Linux eBPF Rootkit πŸ› 

TripleCross is a Linux eBPF rootkit that demonstrates the offensive capabilities of the eBPF technology. TripleCross is inspired by previous implant designs in this area, notably the works of Jeff Dileo at DEFCON 271, Pat Hogan at DEFCON 292, Guillaume Fournier and Sylvain Afchain also at DEFCON 293, and Kris NΓ³va's Boopkit4. The authors reuse and extend some of the techniques pioneered by these previous explorations of the offensive capabilities of eBPF technology.

πŸ“– Read

via "Packet Storm Security".
πŸ—“οΈ CWE Top 25: These are the most dangerous software weaknesses of 2022 πŸ—“οΈ

CISA and MITRE’s latest CWE shakeup reveals the most severe threats impacting enterprise software today

πŸ“– Read

via "The Daily Swig".
⚠ Google patches β€œin-the-wild” Chrome zero-day – update now! ⚠

Running Chrome? Do the "Help-About-Update" dance move right now, just to be sure...

πŸ“– Read

via "Naked Security".
πŸ‘1
πŸ—“οΈ Spring Data MongoDB hit by another critical SpEL injection flaw πŸ—“οΈ

Bug mirrors recent SpEL injection vulnerability that emerged alongside β€˜SpringShell’ issue

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-43116 β€Ό

An Access Control vulnerability exists in Nacos 2.0.3 in the access prompt page; enter username and password, click on login to capture packets and then change the returned package, which lets a malicious user login.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31836 β€Ό

The leafInfo.match() function in Beego v2.0.3 and below uses path.join() to deal with wildcardvalues which can lead to cross directory risk.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Google Chrome WebRTC Zero-Day Faces Active Exploitation πŸ•΄

The heap buffer-overflow issue in Chrome for Android could be used for DoS, code execution, and more.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Why Browser Vulnerabilities Are a Serious Threat β€” and How to Minimize Your Risk πŸ•΄

As a result of browser market consolidation, adversaries can focus on uncovering vulnerabilities in just two main browser engines.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-31770 β€Ό

IBM App Connect Enterprise Certified Container 4.2 could allow a user from the administration console to cause a denial of service by creating a specially crafted request. IBM X-Force ID: 228221.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34879 β€Ό

Reflected Cross Site Scripting (XSS) vulnerabilities in AST Agent Time Sheet interface (/vicidial/AST_agent_time_sheet.php) of VICIdial via agent, and search_archived_data parameters. This issue affects: VICIdial 2.14b0.5 versions prior to 3555.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34876 β€Ό

SQL Injection vulnerability in admin interface (/vicidial/admin.php) of VICIdial via modify_email_accounts, access_recordings, and agentcall_email parameters allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. This issue affects: VICIdial 2.14b0.5 versions prior to 3555.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34878 β€Ό

SQL Injection vulnerability in User Stats interface (/vicidial/user_stats.php) of VICIdial via the file_download parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-34877 β€Ό

SQL Injection vulnerability in AST Agent Time Sheet interface ((/vicidial/AST_agent_time_sheet.php) of VICIdial via the agent parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. This issue affects: VICIdial 2.14b0.5 versions prior to 3555.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ NCSC concerned for UK cyber experts burning out over Russia-Ukraine cyber war πŸ“’

The nation's cyber authority has provided organisations with advice on how to deal with an extended period of heightened threat

πŸ“– Read

via "ITPro".
πŸ“’ Cross-party MPs urge ban on two Chinese CCTV companies citing ethics and security concerns πŸ“’

Hikvision and Dahua are used by over 60% of UK public bodies, despite widespread criticism around alleged ties to crimes in Xinjiang

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ Six cyber security disruptors to watch in 2022 πŸ“’

The companies breaking new ground in data retention, software development, training, risk management, and automation

πŸ“– Read

via "ITPro".