🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
📢 2022 Magic quadrant for Security Information and Event Management (SIEM) 📢

SIEM is evolving into a security platform with multiple features and deployment models

📖 Read

via "ITPro".
📢 Pro-Russia Killnet hackers claim DDoS attack on EU Parliament website 📢

The attack was launched shortly after MEPs voted to brand Russia a state-sponsor of terrorism for its invasion of Ukraine

📖 Read

via "ITPro".
📢 How to wipe a laptop easily and securely 📢

A step-by-step guide on how to wipe a laptop safely, regardless of whether it's running Windows, Mac, or Linux

📖 Read

via "ITPro".
👍1
📢 Podcast transcript: How secure is metaverse tech? 📢

Read the full transcript for this episode of the IT Pro Podcast

📖 Read

via "ITPro".
📢 Japan considers creating new cyber defence agency as attacks ramp up in region 📢

The country may be looking to ramp up its defences as Asia was the most-attacked global region in 2021, according to one report

📖 Read

via "ITPro".
📢 How we test: Security software 📢

Everything you need to know about our benchmarking process for antivirus products

📖 Read

via "ITPro".
👍1
📢 Google Cloud Platform now automatically detects highly common ransomware dropper 📢

Cobalt Strike is one of the most widely abused cyber security tools on the market and the latest measures aim to prevent cloud-based cyber attacks

📖 Read

via "ITPro".
📢 2022 IBM's Security X-Force cloud threat landscape report 📢

Recommendations for preparing and responding to cloud breaches

📖 Read

via "ITPro".
👍1
CVE-2022-45908

In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.

📖 Read

via "National Vulnerability Database".
CVE-2022-45909

drachtio-server 0.8.18 has a heap-based buffer over-read via a long Request-URI in an INVITE request.

📖 Read

via "National Vulnerability Database".
CVE-2022-45907

In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.

📖 Read

via "National Vulnerability Database".
Chrome fixes 8th zero-day of 2022 – check your version now

There isn't a rhyme to remind you which months have browser zero-days... you just have to keep your eyes and ears open!

📖 Read

via "Naked Security".
👍1
📢 Avast Premium Business Security review: Feature-rich endpoint management for SMBs 📢

Avast delivers a wealth of tough, easily managed endpoint protection measures at a good price

📖 Read

via "ITPro".
📢 17 Windows 10 problems and how to fix them 📢

Tips and tricks to help you solve Windows 10 upgrade problems, for everything from freeing up storage, to solving privacy errors and using safe mode

📖 Read

via "ITPro".
📢 Interpol arrests nearly 1,000 cyber criminals in months-long anti-fraud operation 📢

Operation HAECHI-III sees the seizure of more than $130 million in virtual assets

📖 Read

via "ITPro".
📢 Google rolls out patch for high-severity Chrome browser zero day 📢

It's the eighth time this year Google has been forced to address a zero-day vulnerability in its world-leading browser

📖 Read

via "ITPro".
CVE-2022-45939

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

📖 Read

via "National Vulnerability Database".
👍1
CVE-2022-43589

A null pointer dereference vulnerability exists in the handle_ioctl_8314C functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
CVE-2022-43590

A null pointer dereference vulnerability exists in the handle_ioctl_0x830a0_systembuffer functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
CVE-2022-43588

A null pointer dereference vulnerability exists in the handle_ioctl_83150 functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
🕴 Bring Your Own Key — A Placebo? 🕴

BYOK was envisioned to reduce the risk of using a cloud service provider processing sensitive data, yet there are several deficiencies.

📖 Read

via "Dark Reading".