πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2018-25045 β€Ό

Django REST framework (aka django-rest-framework) before 3.9.1 allows XSS because the default DRF Browsable API view templates disable autoescaping.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1146 β€Ό

Inappropriate implementation in Resource Timing in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1129 β€Ό

Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 100.0.4896.60 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1137 β€Ό

Inappropriate implementation in Extensions in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to leak potentially sensitive information via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1125 β€Ό

Use after free in Portals in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1128 β€Ό

Inappropriate implementation in Web Share API in Google Chrome on Windows prior to 100.0.4896.60 allowed an attacker on the local network segment to leak cross-origin data via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1132 β€Ό

Inappropriate implementation in Virtual Keyboard in Google Chrome on Chrome OS prior to 100.0.4896.60 allowed a local attacker to bypass navigation restrictions via physical access to the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1130 β€Ό

Insufficient validation of trust input in WebOTP in Google Chrome on Android prior to 100.0.4896.60 allowed a remote attacker to send arbitrary intents from any app via a malicious app.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1138 β€Ό

Inappropriate implementation in Web Cursor in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who had compromised the renderer process to obscure the contents of the Omnibox (URL bar) via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1096 β€Ό

Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1139 β€Ό

Inappropriate implementation in Background Fetch API in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1136 β€Ό

Use after free in Tab Strip in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific set of user gestures.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1127 β€Ό

Use after free in QR Code Generator in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1133 β€Ό

Use after free in WebRTC Perf in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Russian cyber attacks on Ukraine: What we know so far πŸ“’

The conflict between Russia and Ukraine has set the tone for all future wars, and the cyber attacks observed throughout will provide a how-to guide on handling simultaneous cyber and kinetic warfare

πŸ“– Read

via "ITPro".
πŸ“’ Mysterious MacOS spyware discovered using public cloud storage as its control server πŸ“’

Researchers have warned that little is known about the 'CloudMensis' malware, including how it is distributed and who is behind it

πŸ“– Read

via "ITPro".
πŸ“’ Hackers hiding malicious links in top Google search results, researchers warn πŸ“’

Malicious adverts made to resemble links to websites are targeting some of the world’s most popular websites

πŸ“– Read

via "ITPro".
πŸ“’ (ISC)2 offers free cyber security certifications to one million people πŸ“’

The scheme builds on the earlier efforts to provide 100,000 people in the UK with free cyber security training

πŸ“– Read

via "ITPro".
πŸ“’ GPS tracker exploit puts the world's most high-value individuals in real-world danger πŸ“’

Vulnerabilities in a GPS tracker used by governments, militaries, and Fortune 50 companies could be used to track the locations of high-value targets and disable emergency service vehicles

πŸ“– Read

via "ITPro".
πŸ“’ Sophos announces new X-Ops unit to streamline defence against cyber attacks πŸ“’

New team unifies vendor’s threat response, labs, and AI teams of cybersecurity experts

πŸ“– Read

via "ITPro".
πŸ“’ Romanian man extradited to US over Gozi virus hacking charges πŸ“’

The man allegedly ran a service that helped cyber criminals distribute the Gozi virus which ended up infecting over one million computers worldwide, including some which belonged to NASA

πŸ“– Read

via "ITPro".