πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-34245 β€Ό

Adobe InDesign versions 17.2.1 (and earlier) and 16.4.1 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34219 β€Ό

Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34228 β€Ό

Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34236 β€Ό

Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34244 β€Ό

Adobe Photoshop versions 22.5.7 (and earlier) and 23.3.2 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Netwrix Auditor Bug Could Lead to Active Directory Domain Compromise πŸ•΄

IT asset tracker and auditor software has a critical issue with insecure object deserialization that could allow threat actors to execute code, researchers say.

πŸ“– Read

via "Dark Reading".
πŸ“’ Microsoft unveils wide-scale phishing campaign that circumvents MFA πŸ“’

More than 10,000 organisations have been targeted using the convincing adversary-in-the-middle attack method

πŸ“– Read

via "ITPro".
πŸ“’ What is zero trust? πŸ“’

How a zero trust security strategy better protects your business from internal and external attackers

πŸ“– Read

via "ITPro".
πŸ“’ Bandai Namco finally confirms massive cyber attack πŸ“’

AlphV/BlackCat claims "data is coming soon" to its deep web blog in a suspected double-extortion ransomware attack

πŸ“– Read

via "ITPro".
πŸ“’ Chinese authorities summon Alibaba executives over data breach πŸ“’

An unknown attacker stole the data of over a billion citizens from a police database, in one of the largest breaches recorded in history

πŸ“– Read

via "ITPro".
πŸ“’ BAE Systems lands $699 million US army HPC contract πŸ“’

Defense giant will operate and maintain the military’s high performance computing systems until

πŸ“– Read

via "ITPro".
πŸ“’ The psychology of secure passwords πŸ“’

The tricks for overcoming poor security hygiene like weak passwords and password reuse

πŸ“– Read

via "ITPro".
πŸ“’ Retbleed hardware-level flaw brings overhead woe to Intel and AMD πŸ“’

β€˜Retbleed’ threatens a wide range of microprocessors, using a vector thought safe that adds to its problematic nature

πŸ“– Read

via "ITPro".
πŸ“’ Microsoft makes Windows Autopatch generally available to enterprise users πŸ“’

First announced in April, the feature has been met with confusion from the industry

πŸ“– Read

via "ITPro".
πŸ“’ What is threat hunting? πŸ“’

Although most threats can be dealt with automatically, the tougher ones require a bit more investigation

πŸ“– Read

via "ITPro".
πŸ“’ FTC fires warning against sensitive data misuse πŸ“’

The agency has responded to fears around biometric data breaches, including those relating to abortion services

πŸ“– Read

via "ITPro".
πŸ“’ Deloitte launches Zero Trust Access for enterprises πŸ“’

The managed security service protects applications regardless of their location or typeβ€Œ

πŸ“– Read

via "ITPro".
πŸ“’ Australian university suffers data breach of 47,000 students πŸ“’

The attacker also launched a smishing attempt while inside the university’s systems

πŸ“– Read

via "ITPro".
πŸ“’ Actively exploited zero-day and four 'critical' vulnerabilities fixed in Microsoft's July Patch Tuesday πŸ“’

The month's list of 84 bug fixes has been branded "boring" by some experts but should be welcome news to security personnel

πŸ“– Read

via "ITPro".
πŸ“’ Cyber attackers strike flood monitoring system in Goa, India πŸ“’

Ransomware attack has prevented the ability to back up data, with attackers demanding Bitcoin in return for decryption

πŸ“– Read

via "ITPro".
πŸ“’ What is cyber insurance? πŸ“’

In an age of increasingly devastating cyber attacks, many businesses are looking to cyber insurance to cushion the financial blow

πŸ“– Read

via "ITPro".