πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Lazarus group targets macOS users with counterfeit crypto job offers πŸ“’

The hacker group previously impersonated Coinbase to lure job seekers

πŸ“– Read

via "ITPro".
πŸ“’ Microsoft to end Client Access Rules support in Exchange Online by 2023 πŸ“’

The deprecation process will begin as early as October 2022, according to reports

πŸ“– Read

via "ITPro".
πŸ“’ SimpliSafe vs Ring πŸ“’

We compare SimpliSafe and Ring to help you decide which business security system for best for you

πŸ“– Read

via "ITPro".
πŸ“’ NCS partners with Singapore government to provide 1,600 tech opportunities πŸ“’

The Singtel subsidiary has launched two new programmes to provide work and training to university graduates

πŸ“– Read

via "ITPro".
πŸ•΄ Contrast Security Launches Expanded Security Testing Tools for JavaScript and Popular Angular, React, and jQuery Frameworks πŸ•΄

New language and framework support empowers developers to analyze front-end code for vulnerabilities throughout the development lifecycle.

πŸ“– Read

via "Dark Reading".
πŸ•΄ New SonicWall Survey Data Reveals 91% of Organizations Fear Ransomware Attacks in 2022 πŸ•΄

Amid an economic downturn, cybersecurity staffing shortages, and endless cyberattacks, financially motivated attacks are the top concern among IT professionals.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Research Reveals Microsoft Teams Security and Backup Flaws, With Over Half of Users Sharing Business-Critical Information on the Platform πŸ•΄

Most backup and security vendors overlook this vital communication channel.

πŸ“– Read

via "Dark Reading".
πŸ•΄ School Is in Session: 5 Lessons for Future Cybersecurity Pros πŸ•΄

Opportunities in the field continue to grow β€” and show no signs of slowing down.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ The exploitability advisory: CISA’s VEX offers fresh take on tackling known vulnerabilities πŸ—“οΈ

β€˜SBOM turns on flashing lights on the dashboard; VEX helps you figure out which to turn off’

πŸ“– Read

via "The Daily Swig".
⚠ S3 Ep103: Scammers in the Slammer (and other stories) [Audio + Text] ⚠

Latest episode - listen and learn now (or read and revise, if the written word is your thing)...

πŸ“– Read

via "Naked Security".
πŸ•΄ Russia-Linked Cybercrime Group Hawks Combo of Malicious Services With LilithBot πŸ•΄

The malware-as-a-service group Eternity is selling a one-stop shop for various malware modules it's been distributing individually via a subscription model on Telegram.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Hackers Have It Out for Microsoft Email Defenses πŸ•΄

Cybercriminals are focusing more and more on crafting special email attacks that evade Microsoft Defender and Office security.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Dex patches authentication bug that enabled unauthorized access to client applications πŸ—“οΈ

With 35.6 million downloads the OAuth 2.0 protocol provider has serious downstream attack surface

πŸ“– Read

via "The Daily Swig".
πŸ” Digital Guardian Wins Data Leak Detection Solution of the Year in CyberSecurity Breakthrough Awards πŸ”

Judges looked at criteria, including innovation, performance, ease of use, functionality, value, and impact, for the award.

πŸ“– Read

via "".
πŸ•΄ US Consumers Are Finally Becoming More Security & Privacy Conscious πŸ•΄

The trend, spotted by Consumer Reports, could mean good news for organizations struggling to contain remote work challenges.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-37888 β€Ό

There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3002 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2637 β€Ό

Incorrect Privilege Assignment vulnerability in Hitachi Storage Plug-in for VMware vCenter allows remote authenticated users to cause privilege escalation. This issue affects: Hitachi Storage Plug-in for VMware vCenter 04.8.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-40160 β€Ό

Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31008 β€Ό

RabbitMQ is a multi-protocol messaging and streaming broker. In affected versions the shovel and federation plugins perform URI obfuscation in their worker (link) state. The encryption key used to encrypt the URI was seeded with a predictable secret. This means that in case of certain exceptions related to Shovel and Federation plugins, reasonably easily deobfuscatable data could appear in the node log. Patched versions correctly use a cluster-wide secret for that purpose. This issue has been addressed and Patched versions: `3.10.2`, `3.9.18`, `3.8.32` are available. Users unable to upgrade should disable the Shovel and Federation plugins.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3389 β€Ό

Path Traversal in GitHub repository ikus060/rdiffweb prior to 2.4.10.

πŸ“– Read

via "National Vulnerability Database".