πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Cerberus Sentinel Announces Acquisition of CUATROi πŸ•΄

US cybersecurity services firm expands services in Latin America.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ Building a Strong SOC Starts With People πŸ•΄

A people-first approach reduces fatigue and burnout, and it empowers employees to seek out development opportunities, which helps retention.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Phishing Campaign Targets PyPI Users to Distribute Malicious Code πŸ•΄

The first-of-its-kind campaign threatens to remove code packages if developers don’t submit their code to a "validation" process.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ How 1-Time Passcodes Became a Corporate Liability β™ŸοΈ

Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some of the world's largest technology companies and customer support firms. A recent spate of SMS phishing attacks from one cybercriminal group has spawned a flurry of breach disclosures from affected companies, which are all struggling to combat the same lingering security threat: The ability of scammers to interact directly with employees through their mobile devices.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware πŸ•΄

Nearly half of respondents say their company relies on outdated backup and recovery infrastructure β€” in some cases dating back to the 1990s, before today's sophisticated cyberattacks.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Log4Shell legacy? Patching times plummet for most critical vulnerabilities – report πŸ—“οΈ

Trustwave report also finds 2022 is set to surpass 2021 for volume of critical CVEs

πŸ“– Read

via "The Daily Swig".
πŸ›  Zeek 5.0.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
❌ Watering Hole Attacks Push ScanBox Keylogger ❌

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2022-37149 β€Ό

WAVLINK WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability when operating the file adm.cgi. This vulnerability allows attackers to execute arbitrary commands via the username parameter.

πŸ“– Read

via "National Vulnerability Database".
⚠ JavaScript bugs aplenty in Node.js ecosystem – found automatically ⚠

How to get the better of bugs in all the possible packages in your supply chain?

πŸ“– Read

via "Naked Security".
πŸ•΄ Security Culture: An OT Survival Story πŸ•΄

The relationship between information technology and operational technology will need top-down support if a holistic security culture is to truly thrive.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Chinese Hackers Target Energy Sector in Australia, South China Sea πŸ•΄

The phishing campaign deploying a ScanBox reconnaissance framework has targeted the Australian government and companies maintaining wind turbines in the South China Sea.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-37176 β€Ό

Tenda AC6(AC1200) v5.0 Firmware v02.03.01.114 and below contains a vulnerability which allows attackers to remove the Wi-Fi password and force the device into open security mode via a crafted packet sent to goform/setWizard.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36552 β€Ό

Tenda AC6(AC1200) v5.0 Firmware v02.03.01.114 and below contains an issue in the component /cgi-bin/DownloadFlash which allows attackers to steal all data such as source code and system files via a crafted GET request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37237 β€Ό

An attacker can send malicious RTMP requests to make the ZLMediaKit server crash remotely. Affected version is below commit 7d8b212a3c3368bc2f6507cb74664fc419eb9327.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29864 β€Ό

IBM Security Identity Manager 6.0 and 6.0.2 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 206089

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Don't Let 'Perfect' Be the Enemy of a Good AppSec Program πŸ•΄

These five suggestions provide a great place to start building a scalable and affordable program for creating secure apps.

πŸ“– Read

via "Dark Reading".
πŸ•΄ New ODGen Tool Unearths 180 Zero-Days in Node.js Libraries πŸ•΄

New graph-based tool offers a better alternative to current approaches for finding vulnerabilities in JavaScript code, they note.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-36563 β€Ό

Incorrect access control in the install directory (C:\RailsInstaller) of Rubyinstaller2 v3.1.2 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-34368 β€Ό

Dell EMC NetWorker 19.2.1.x 19.3.x, 19.4.x, 19.5.x, 19.6.x and 19.7.0.0 contain an Improper Handling of Insufficient Permissions or Privileges vulnerability. Authenticated non admin user could exploit this vulnerability and gain access to restricted resources.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36561 β€Ό

XPDF v4.0.4 was discovered to contain a segmentation violation via the component /xpdf/AcroForm.cc:538.

πŸ“– Read

via "National Vulnerability Database".