πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Twilio account breach result of sophisticated social engineering campaign πŸ“’

Employees were subjected to personalised texts that impersonated Twilio's IT department, in a strategic credential harvesting operation

πŸ“– Read

via "ITPro".
πŸ“’ Nomad happy to forgive hackers if they return 90% of $190 million that was stolen πŸ“’

The crypto bridge is offering 'white hat hackers' a 10% bounty following the attack earlier this week

πŸ“– Read

via "ITPro".
πŸ“’ Brave pushes the boundaries of privacy by design πŸ“’

It’s quite a big step to abandon the big three of Chrome, Edge and Safari for a niche option that doesn’t just tack privacy on top

πŸ“– Read

via "ITPro".
πŸ“’ Meta clamps down on South Asian cyber espionage operations involving Facebook πŸ“’

The firm’s latest threat intelligence report discloses successful takedowns in India, Greece, South Africa and Indonesia

πŸ“– Read

via "ITPro".
πŸ“’ South Korean public sector organisations targeted by Gwisin ransomware πŸ“’

Threat actors tailored attacks on victims such as pharmaceutical companies, with researchers still in the dark on key details

πŸ“– Read

via "ITPro".
πŸ“’ Home Office to collect foreign offenders' biometric data using smartwatch scheme πŸ“’

Facial recognition and geolocation data will be matched against Home Office, Ministry of Justice and police databases

πŸ“– Read

via "ITPro".
πŸ“’ Both Russia and Ukraine targeted by Chinese state-backed hackers πŸ“’

A five-year-old Microsoft Office vulnerability was enough to gain a significant foothold in some of the most high-value organisations in each country

πŸ“– Read

via "ITPro".
πŸ“’ Why convenience is the biggest threat to your security πŸ“’

The shortcuts and human error that lead to breaches - and how to guard against them

πŸ“– Read

via "ITPro".
β€Ό CVE-2022-2242 β€Ό

The KUKA SystemSoftware V/KSS in versions prior to 8.6.5 is prone to improper access control as an unauthorized attacker can directly read and write robot configurations when access control is not available or not enabled (default).

πŸ“– Read

via "National Vulnerability Database".
❌ Microsoft Patches β€˜Dogwalk’ Zero-Day and 17 Critical Flaws ❌

August Patch Tuesday tackles 121 CVEs, 17 critical bugs and one zero-day bug exploited in the wild.

πŸ“– Read

via "Threat Post".
πŸ•΄ UntitledFlow Security Launches Next-Gen Data Security Platform Following $10 Million Seed Round πŸ•΄

First-of-its-kind solution discovers and protects both data at rest and in motion.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Cisco router flaw gives patient attackers full access to small business networks πŸ—“οΈ

Vulnerable path is reachable just once a day, but patches still need to be implemented as a matter of priority

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Compliance Certifications: Worth the Effort? πŸ•΄

Because demonstrating compliance with industry regulations can be cumbersome and expensive, it's important to ensure they're also absolutely essential.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-36324 β€Ό

A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions). Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46304 β€Ό

A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions), CP-8021 MASTER MODULE (All versions), CP-8022 MASTER MODULE WITH GPRS (All versions). The component allows to activate a web server module which provides unauthenticated access to its web pages. This could allow an attacker to retrieve debug-level information from the component such as internal network topology or connected systems.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34661 β€Ό

A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.15), Teamcenter V13.0 (All versions < V13.0.0.10), Teamcenter V13.1 (All versions < V13.1.0.10), Teamcenter V13.2 (All versions < V13.2.0.9), Teamcenter V13.3 (All versions < V13.3.0.5), Teamcenter V14.0 (All versions < V14.0.0.2). File Server Cache service in Teamcenter is vulnerable to denial of service by entering infinite loops and using up CPU cycles. This could allow an attacker to cause denial of service condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34660 β€Ό

A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.15), Teamcenter V13.0 (All versions < V13.0.0.10), Teamcenter V13.1 (All versions < V13.1.0.10), Teamcenter V13.2 (All versions < V13.2.0.9), Teamcenter V13.3 (All versions < V13.3.0.5), Teamcenter V14.0 (All versions < V14.0.0.2). File Server Cache service in Teamcenter consist of a functionality that is vulnerable to command injection. This could potentially allow an attacker to perform remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34659 β€Ό

A vulnerability has been identified in Simcenter STAR-CCM+ (All versions only if the Power-on-Demand public license server is used). Affected applications expose user, host and display name of users, when the public license server is used. This could allow an attacker to retrieve this information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36323 β€Ό

A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions < V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36325 β€Ό

A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions < V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions). Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Deepfence ThreatMapper 1.4 Unveils Open Source Threat Graph to Visualize Cloud-Native Threat Landscape πŸ•΄

New release also includes enterprise-grade cloud security posture management (CSPM) and YARA-based malware scanning capabilities.

πŸ“– Read

via "Dark Reading".