πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ GitLab patches RCE bug in GitHub import function πŸ—“οΈ

Data importation mechanism failed to sanitize imports

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Attackers Use Automation to Speed from Exploit to Compromise According to Lacework Labs Cloud Threat Report πŸ•΄

New open source Cloud Hunter tool, developed through Lacework Labs research, helps customers get better visibility to reduce response times for incident investigations.

πŸ“– Read

via "Dark Reading".
πŸ•΄ State of Security Data Management 2022 Report Reveals Overconfidence Masks a Pervasive Data Problem πŸ•΄

Despite dozens of tools and external vendors, 2 in 3 organizations believe their data strategy isn't sustainable beyond three years, which could leave businesses vulnerable.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-41475 β€Ό

RPCMS v3.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add an administrator account.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41473 β€Ό

RPCMS v3.0.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the Search function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41474 β€Ό

RPCMS v3.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily change the password of any account.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41489 β€Ό

WAYOS LQ_09 22.03.17V was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to send crafted requests to the server from the affected device. This vulnerability is exploitable due to a lack of authentication in the component Usb_upload.htm.

πŸ“– Read

via "National Vulnerability Database".
⚠ Patch Tuesday in brief – one 0-day fixed, but no patches for Exchange! ⚠

There's a zero-day patch, but it's not for the zero-day you thought.

πŸ“– Read

via "Naked Security".
⚠ S3 Ep104: Should hospital ransomware attackers be locked up for life? [Audio + Text] ⚠

Have your say on three deep questions posed by this week's podcast. Read or listen as suits you best...

πŸ“– Read

via "Naked Security".
πŸ•΄ Cyberattackers Spoof Google Translate in Unique Phishing Tactic πŸ•΄

The campaign uses a combination of tactics and a common JavaScript obfuscation technique to fool both end users and email security scanners to steal credentials.

πŸ“– Read

via "Dark Reading".
πŸ•΄ What You Need for a Strong Security Posture πŸ•΄

From the basics to advanced techniques, here's what you should know.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Orange Bank Deploys Real-Time Sanctions Screening with SAS and Neterium πŸ•΄

SAS and Neterium partnered to deliver Neterium’s next-gen screening capabilities on SAS’ analytics platform.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Playbook for Human-Operated Ransomware πŸ•΄

Ransomware attacks are on the rise, but organizations also have access to advanced tools and technologies they can use to fight back.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Nudge Security Launches Platform With Humans in Mind πŸ•΄

SaaS security platform promises to track down shadow IT, map supply chain risk, and "nudge" employees to work securely.

πŸ“– Read

via "Dark Reading".
πŸ•΄ DFIN DealMaker Meter: Surge in 'Dark Data' Represents Growing Danger for Corporations πŸ•΄

This legacy of corporations' appetite for data is not worth the risk, leaders say, emphasizing the need to find, secure and redact records

πŸ“– Read

via "Dark Reading".
πŸ•΄ Tanium Benchmark Sets New Standard for Tracking and Improving Security and Operational Metrics πŸ•΄

Company enables organizations to mark endpoint performance and take immediate action to mitigate risk.

πŸ“– Read

via "Dark Reading".
πŸ•΄ QAKBOT Attacks Spike Amid Concerning Cybercriminal Collaborations πŸ•΄

The QAKBOT group has successfully ramped up its operations, infecting systems, installing attack frameworks, and selling access to other groups, including Black Basta.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26860 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26863 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41484 β€Ό

Tenda AC1200 US_AC6V2.0RTL_V15.03.06.51_multi_TDE01 was discovered to contain a buffer overflow in the 0x32384 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26859 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".