πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Uptycs Introduces Detections that Correlate Threat Activity from the Kubernetes Control Plane and Container Runtime πŸ•΄

Comprehensive CNAPP coverage for Kubernetes and containers in a single solution.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Godspeed Capital-Backed SilverEdge Partners with Counter Threat Solutions πŸ•΄

Affiliation adds new all-source and counterintelligence, cyber, software development, and identity intelligence capabilities to SilverEdge's growing suite of technology solutions focused on the US intelligence community.

πŸ“– Read

via "Dark Reading".
πŸ“’ Best free malware removal tools 2022 πŸ“’

Worried your device is infected? Here are some of the best free tools for removing malicious software from your systems

πŸ“– Read

via "ITPro".
πŸ“’ Cynet unveils new global partner programme πŸ“’

XDR platform provider strengthens its channel-first business model to help boost partners sales

πŸ“– Read

via "ITPro".
πŸ“’ NCSC founder details 'biggest regret' in underestimating organised cyber crime πŸ“’

In a rare public address, Martin also detailed his proudest achievement and how the idea for the NCSC came to be

πŸ“– Read

via "ITPro".
πŸ“’ Pendragon's zealous response to LockBit ransomware is a breath of fresh air πŸ“’

In a sea of peers that do the bare minimum, the Nottinghamshire-based car dealership is flying the flag for responsible incident disclosure

πŸ“– Read

via "ITPro".
πŸ“’ The sooner the FIDO Alliance can shut down passwords, the better πŸ“’

Passwords aren’t going anywhere, but that hasn’t stopped the dream of a passwordless future – and it seems that Apple, Google and Microsoft agree

πŸ“– Read

via "ITPro".
πŸ“’ UK outsourcer Interserve fined Β£4.4 million for litany of data protection failings πŸ“’

The numerous security blunders allowed cyber attackers to comprise its systems, install malware, and access the personal data of 113,000 of its staff

πŸ“– Read

via "ITPro".
πŸ“’ The future of work is already here. Now’s the time to secure it. πŸ“’

Robust security to protect and enable your business

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ Australia to increase maximum data breach penalty to $50 million πŸ“’

The country's government is looking to raise the maximum fine from $2 million AUD and introduce new legislation to handle cyber attacks better

πŸ“– Read

via "ITPro".
⚠ When cops hack back: Dutch police fleece DEADBOLT criminals (legally!) ⚠

Crooks: Show us the money! Cops: How about you show us the decryption keys first?

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-44769 β€Ό

An improper input validation vulnerability in the TLS certificate generation function allows an attacker to cause a Denial-of-Service (DoS) condition which can only be reverted via a factory reset. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44776 β€Ό

A broken access control vulnerability in the SubNet_handler_func function of spx_restservice allows an attacker to arbitrarily change the security access rights to KVM and Virtual Media functionalities. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26731 β€Ό

Command injection and multiple stack-based buffer overflows vulnerabilities in the modifyUserb_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45925 β€Ό

Observable discrepancies in the login process allow an attacker to guess legitimate user names registered in the BMC. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42010 β€Ό

Heron versions <= 0.20.4-incubating allows CRLF log injection because of the lack of escaping in the log statements. Please update to version 0.20.5-incubating which addresses this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38117 β€Ό

Juiker app hard-coded its AES key in the source code. A physical attacker, after getting the Android root privilege, can use the AES key to decrypt usersÒ€ℒ ciphertext and tamper with it.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39314 β€Ό

Kirby is a flat-file CMS. In versions prior to 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1, Kirby is subject to user enumeration due to Improper Restriction of Excessive Authentication Attempts. This vulnerability affects you only if you are using the `code` or `password-reset` auth method with the `auth.methods` option or if you have enabled the `debug` option in production. By using two or more IP addresses and multiple login attempts, valid user accounts will lock, but invalid accounts will not, leading to account enumeration. This issue has been patched in versions 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1. If you cannot update immediately, you can work around the issue by setting the `auth.methods` option to `password`, which disables the code-based login and password reset forms.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46279 β€Ό

Session fixation and insufficient session expiration vulnerabilities allow an attacker to perfom session hijacking attacks against users. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-36368 β€Ό

Multiple stored cross-site scripting vulnerabilities in the web user interface of IPFire versions prior to 2.27 allows a remote authenticated attacker with administrative privilege to inject an arbitrary script.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41799 β€Ό

Improper access control vulnerability in GROWI prior to v5.1.4 (v5 series) and versions prior to v4.5.25 (v4 series) allows a remote authenticated attacker to bypass access restriction and download the markdown data from the pages set to private by the other users.

πŸ“– Read

via "National Vulnerability Database".