πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-39286 β€Ό

Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in CWD. This vulnerability allows one user to run code as another. Version 4.11.2 contains a patch for this issue. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Hive ransomware group claims cyber attack on India’s Tata Power πŸ“’

The Indian energy company reported last week that its IT systems were down, with customers reporting difficulties in paying their bills

πŸ“– Read

via "ITPro".
πŸ“’ The ultimate guide to deleting yourself from social media πŸ“’

Worried about oversharing – or just want to kick the social media habit? We’ve outlined concrete steps you can take to delete your identity from the most popular sites and services

πŸ“– Read

via "ITPro".
πŸ“’ ExtraHop partners with Splunk SOAR to offer visibility into encrypted network traffic πŸ“’

The new platform integration aims to reduce the amount of time security professionals spend on low-level analysis tasks

πŸ“– Read

via "ITPro".
πŸ“’ Palo Alto Networks expands NextWave partner network πŸ“’

The revamped initiative aims to help partners deliver incident response services built on Cortex XDR

πŸ“– Read

via "ITPro".
πŸ“’ A strategic guide for controlling and securing your data πŸ“’

Forrester's data security control framework

πŸ“– Read

via "ITPro".
πŸ“’ FTC orders Uber-owned Drizly to improve "lax" data protection approach following 2020 breach πŸ“’

The Uber subsidiary has been hit with an FTC complaint, as the agency looks to send a message to the wider industry

πŸ“– Read

via "ITPro".
πŸ“’ What is secure deletion? πŸ“’

Want to ensure your deleted data can’t be recovered and abused? We explore how secure deletion works, and how you can best protect your information

πŸ“– Read

via "ITPro".
πŸ“’ Database and big data security πŸ“’

KuppingerCole 2021 Leadership Compass Report

πŸ“– Read

via "ITPro".
πŸ“’ Apple patches actively exploited iPhone, iPad zero-day and 18 other security flaws πŸ“’

The out-of-bounds write error is the eighth actively exploited zero-day impacting Apple hardware this year and could facilitate kernel-level code execution

πŸ“– Read

via "ITPro".
πŸ“’ Building a better password strategy for your business πŸ“’

Exploring the strategies and exploits that hackers are using to circumvent password security measures

πŸ“– Read

via "ITPro".
πŸ“’ Medibank reveals damning extent of hack that could cost $35 million πŸ“’

The company disclosed that the attackers also had access to all of its circa 3.9 million customers' records, equivalent to 15% of the nation’s population

πŸ“– Read

via "ITPro".
⚠ Online ticketing company β€œSee” pwned for 2.5 years by attackers ⚠

Don't be a cybersecurity slowcoach - you need to spot possible attacks as soon as you can.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-3719 β€Ό

A vulnerability has been found in Exiv2 and classified as critical. This vulnerability affects the function QuickTimeVideo::userDataDecoder of the file quicktimevideo.cpp of the component QuickTime Video Handler. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The name of the patch is a38e124076138e529774d5ec9890d0731058115a. It is recommended to apply a patch to fix this issue. VDB-212350 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3716 β€Ό

A vulnerability classified as problematic was found in SourceCodester Online Medicine Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /omos/admin/?page=user/list. The manipulation of the argument First Name/Middle Name/Last Name leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-212347.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-25918 β€Ό

The package shescape from 1.5.10 and before 1.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the escape function in index.js, due to the usage of insecure regex in the escapeArgBash function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3714 β€Ό

A vulnerability classified as critical has been found in SourceCodester Online Medicine Ordering System 1.0. Affected is an unknown function of the file admin/?page=orders/view_order. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. VDB-212346 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3717 β€Ό

A vulnerability, which was classified as critical, has been found in Exiv2. Affected by this issue is the function BmffImage::boxHandler of the file bmffimage.cpp. The manipulation leads to memory corruption. The attack may be launched remotely. The name of the patch is a58e52ed702d3bc7b8bab7ec1d70a4849eebece3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-212348.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45476 β€Ό

Yordam Library Information Document Automation product before version 19.02 has an unauthenticated reflected XSS vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45475 β€Ό

Yordam Library Information Document Automation product before version 19.02 has an unauthenticated Information disclosure vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3718 β€Ό

A vulnerability, which was classified as problematic, was found in Exiv2. This affects the function QuickTimeVideo::decodeBlock of the file quicktimevideo.cpp of the component QuickTime Video Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The name of the patch is 459910c36a21369c09b75bcfa82f287c9da56abf. It is recommended to apply a patch to fix this issue. The identifier VDB-212349 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".