🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
📢 Pro-Russia Killnet hackers claim DDoS attack on EU Parliament website 📢

The attack was launched shortly after MEPs voted to brand Russia a state-sponsor of terrorism for its invasion of Ukraine

📖 Read

via "ITPro".
📢 How to wipe a laptop easily and securely 📢

A step-by-step guide on how to wipe a laptop safely, regardless of whether it's running Windows, Mac, or Linux

📖 Read

via "ITPro".
👍1
📢 Podcast transcript: How secure is metaverse tech? 📢

Read the full transcript for this episode of the IT Pro Podcast

📖 Read

via "ITPro".
📢 Japan considers creating new cyber defence agency as attacks ramp up in region 📢

The country may be looking to ramp up its defences as Asia was the most-attacked global region in 2021, according to one report

📖 Read

via "ITPro".
📢 How we test: Security software 📢

Everything you need to know about our benchmarking process for antivirus products

📖 Read

via "ITPro".
👍1
📢 Google Cloud Platform now automatically detects highly common ransomware dropper 📢

Cobalt Strike is one of the most widely abused cyber security tools on the market and the latest measures aim to prevent cloud-based cyber attacks

📖 Read

via "ITPro".
📢 2022 IBM's Security X-Force cloud threat landscape report 📢

Recommendations for preparing and responding to cloud breaches

📖 Read

via "ITPro".
👍1
CVE-2022-45908

In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.

📖 Read

via "National Vulnerability Database".
CVE-2022-45909

drachtio-server 0.8.18 has a heap-based buffer over-read via a long Request-URI in an INVITE request.

📖 Read

via "National Vulnerability Database".
CVE-2022-45907

In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.

📖 Read

via "National Vulnerability Database".
Chrome fixes 8th zero-day of 2022 – check your version now

There isn't a rhyme to remind you which months have browser zero-days... you just have to keep your eyes and ears open!

📖 Read

via "Naked Security".
👍1
📢 Avast Premium Business Security review: Feature-rich endpoint management for SMBs 📢

Avast delivers a wealth of tough, easily managed endpoint protection measures at a good price

📖 Read

via "ITPro".
📢 17 Windows 10 problems and how to fix them 📢

Tips and tricks to help you solve Windows 10 upgrade problems, for everything from freeing up storage, to solving privacy errors and using safe mode

📖 Read

via "ITPro".
📢 Interpol arrests nearly 1,000 cyber criminals in months-long anti-fraud operation 📢

Operation HAECHI-III sees the seizure of more than $130 million in virtual assets

📖 Read

via "ITPro".
📢 Google rolls out patch for high-severity Chrome browser zero day 📢

It's the eighth time this year Google has been forced to address a zero-day vulnerability in its world-leading browser

📖 Read

via "ITPro".
CVE-2022-45939

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

📖 Read

via "National Vulnerability Database".
👍1
CVE-2022-43589

A null pointer dereference vulnerability exists in the handle_ioctl_8314C functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
CVE-2022-43590

A null pointer dereference vulnerability exists in the handle_ioctl_0x830a0_systembuffer functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
CVE-2022-43588

A null pointer dereference vulnerability exists in the handle_ioctl_83150 functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
🕴 Bring Your Own Key — A Placebo? 🕴

BYOK was envisioned to reduce the risk of using a cloud service provider processing sensitive data, yet there are several deficiencies.

📖 Read

via "Dark Reading".
CVE-2022-3490

The Checkout Field Editor (Checkout Manager) for WooCommerce WordPress plugin before 1.8.0 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present

📖 Read

via "National Vulnerability Database".