🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Ducktail Spear-Phishing Campaign Uses LinkedIn to Hijack Facebook Business Accounts 🕴

Ducktail targets marketing and HR professionals through LinkedIn to hijack Facebook accounts and run malvertising schemes.

📖 Read

via "Dark Reading".
🕴 How Risk-Based Vulnerability Management Has Made Security Easier 🕴

Trying to remediate everything was never a winning strategy. RBVM is an approach that gets organizations better results with less effort.

📖 Read

via "Dark Reading".
🕴 Flying Blind in Security Operations 🕴

Too many organizations are STILL getting breached. Every day across large and small organizations, intrusions and breaches happen.

📖 Read

via "Dark Reading".
CVE-2022-1651

A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.

📖 Read

via "National Vulnerability Database".
CVE-2022-1671

A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.

📖 Read

via "National Vulnerability Database".
Novel Malware Hijacks Facebook Business Accounts

Newly discovered malware linked to Vietnamese threat actors targets users through a LinkedIn phishing campaign to steal data and admin privileges for financial gain.

📖 Read

via "Threat Post".
🕴 AI Can Help Fintechs Fight Fraud-as-a-Service 🕴

Artificial intelligence tools can help companies strike the right balance between preventing financial crime and maintaining customer service and satisfaction.

📖 Read

via "Dark Reading".
🕴 Discord, Telegram Services Hijacked to Launch Array of Cyberattacks 🕴

Attackers are easily turning popular messaging apps and their associated services — like bots, cloud infrastructure, and CDNs — against users, researchers warn.

📖 Read

via "Dark Reading".
🕴 Economic Downturn Raises Risk of Insiders Going Rogue 🕴

Insiders could become more vulnerable to cybercrime recruitment efforts, new report says.

📖 Read

via "Dark Reading".
🕴 LockBit 3.0: Significantly Improved Ransomware Helps the Gang Stay on Top 🕴

Just ahead of its headline-grabbing attack on the Italian tax agency, the infamous ransomware group debuted an improved version of the malware featuring parts from Egregor and BlackMatter.

📖 Read

via "Dark Reading".
🕴 Microsoft Tops Brands Phishers Prefer 🕴

Wide use of Microsoft 365 applications by business lets phishers easily launch data theft, BEC, ransomware, and other attacks, new report finds.

📖 Read

via "Dark Reading".
🕴 Norton Consumer Cyber Safety Pulse Report: Phishing for New Bait on Social Media 🕴

Year-long analysis from Norton Labs finds nearly three-quarters of phishing sites imitate Facebook.

📖 Read

via "Dark Reading".
🕴 Craig Newmark Gives UC Berkeley $2 Million for University Cybersecurity Clinics 🕴

.

📖 Read

via "Dark Reading".
CVE-2022-29953

The Bently Nevada 3700 series of condition monitoring equipment through 2022-04-29 has a maintenance interface on port 4001/TCP with undocumented, hardcoded credentials. An attacker capable of connecting to this interface can thus trivially take over its functionality.

📖 Read

via "National Vulnerability Database".
CVE-2022-1636

Use after free in Performance APIs in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

📖 Read

via "National Vulnerability Database".
CVE-2021-40180

In the WeChat application 8.0.10 for Android and iOS, a mini program can obtain sensitive information from a user's address book via wx.searchContacts.

📖 Read

via "National Vulnerability Database".
CVE-2022-1637

Inappropriate implementation in Web Contents in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

📖 Read

via "National Vulnerability Database".
CVE-2022-1499

Inappropriate implementation in WebAuthentication in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to bypass same origin policy via a crafted HTML page.

📖 Read

via "National Vulnerability Database".
CVE-2022-1492

Insufficient data validation in Blink Editing in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to inject arbitrary scripts or HTML via a crafted HTML page.

📖 Read

via "National Vulnerability Database".
CVE-2022-1633

Use after free in Sharesheet in Google Chrome on Chrome OS prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific user interactions.

📖 Read

via "National Vulnerability Database".
CVE-2022-29951

JTEKT TOYOPUC PLCs through 2022-04-29 mishandle authentication. They utilize the CMPLink/TCP protocol (configurable on ports 1024-65534 on either TCP or UDP) for a wide variety of engineering purposes such as starting and stopping the PLC, downloading and uploading projects, and changing configuration settings. This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.

📖 Read

via "National Vulnerability Database".