πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ IT Pro News In Review: Global south fights ransomware while Alphabet splurges on blockchain πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
πŸ“’ Record for the largest ever HTTPS DDoS attack smashed once again πŸ“’

The DDoS attack lasted 69 minutes and surpassed the previous record of 26 million RPS

πŸ“– Read

via "ITPro".
πŸ“’ Escape the ransomware maze πŸ“’

Conventional endpoint protection tools just aren’t the best defence anymore

πŸ“– Read

via "ITPro".
β€Ό CVE-2022-34960 β€Ό

The container package in MikroTik RouterOS 7.4beta4 allows an attacker to create mount points pointing to symbolic links, which resolve to locations on the host device. This allows the attacker to mount any arbitrary file to any location on the host.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32427 β€Ό

PrinterLogic Windows Client through 25.0.0.676 allows attackers to execute directory traversal. Authenticated users with prior knowledge of the driver filename could exploit this to escalate privileges or distribute malicious content.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2957 β€Ό

A vulnerability classified as critical was found in SourceCodester Simple and Nice Shopping Cart Script. Affected by this vulnerability is an unknown functionality of the file /mkshop/Men/profile.php. The manipulation of the argument mem_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-207001 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ New Exterro FTK Update Accelerates Mobile Digital Forensics πŸ•΄

The FTK 7.6 portfolio promises better integration with other security and network resources, as well as unified analysis of mobile and computer evidence.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Thousands of Organizations Remain at Risk From Critical Zero-Click IP Camera Bug πŸ•΄

The US Cybersecurity and Infrastructure Security Agency had wanted federal agencies to implement the fix for the RCE flaw in Hikvision cameras by Jan. 24, 2022.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Ethereum Foundation offers $1m bug bounty payouts with proof-of-stake migration multiplier πŸ—“οΈ

Eco-friendly upgrade sends bounties soaring as computational demands plummet

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Optiv's Annual $40K Scholarship for Black, African-American-Identifying STEM Students Now Open for Applicants πŸ•΄

Optiv's Black Employee Network offers the scholarship, paid out over 4 years, for students seeking a career in the cybersecurity/information security industry.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Penetration Testing Market Worth $2.7B By 2027: MarketsandMarkets(TM) Report πŸ•΄

Increase driven by increasingly sophisticated cyberattacks as well as increase in mobile-based business-critical applications, according to report.

πŸ“– Read

via "Dark Reading".
πŸ•΄ What You Need to Know About the Psychology Behind Cyber Resilience πŸ•΄

Understanding how and why people respond to cyber threats is key to building cyber workforce resilience.

πŸ“– Read

via "Dark Reading".
⚠ Breaching airgap security: using your phone’s compass as a microphone! ⚠

One bit per second makes the Voyager probe data rate seem blindingly fast. But it's enough to break your security assumptions...

πŸ“– Read

via "Naked Security".
πŸ•΄ Cyberstarts Closes $60M in Seed Fund III πŸ•΄

Venture firm hires former Splunk CEO to spearhead new GTM advisory board and help portfolio companies scale up.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The (Nation) State of Cyber: 64% of Businesses Suspect They've Been Targeted or Impacted by Nation-State Attacks πŸ•΄

According to new Venafi research, two-thirds of organizations have changed cyber strategy in response to war in Ukraine.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Wyden Renews Call to Encrypt Twitter DMs, Secure Americans' Data From Unfriendly Foreign Governments πŸ•΄

Following whistleblower complaint, Oregon senator renews commitment to passing bipartisan legislation to address the national security risks.

πŸ“– Read

via "Dark Reading".
πŸ” How to Form a Data Recovery Plan: Your Five Step Guide πŸ”

Creating a detailed disaster recovery plan (DRP) can be a daunting and complicated task. Begin forming your plan by including the following five essential steps.


πŸ“– Read

via "".
πŸ›  GNU Privacy Guard 2.2.37 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.

πŸ“– Read

via "Packet Storm Security".
⚠ S3 Ep97: Did your iPhone get pwned? How would you know? [Audio + Text] ⚠

Latest episode - listen now! (Or read the transcript if you prefer the text version.)

πŸ“– Read

via "Naked Security".
πŸ•΄ More Bang for the Buck: Cross-Platform Ransomware Is the Next Problem πŸ•΄

As cryptocurrency valuations make strikes less lucrative, ransomware gangs like the new RedAlert and Monster groups are modifying their tools to attack across platforms.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-36471 β€Ό

H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetMacAccessMode.

πŸ“– Read

via "National Vulnerability Database".