🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
📢 How we test: Security software 📢

Everything you need to know about our benchmarking process for antivirus products

📖 Read

via "ITPro".
👍1
📢 Google Cloud Platform now automatically detects highly common ransomware dropper 📢

Cobalt Strike is one of the most widely abused cyber security tools on the market and the latest measures aim to prevent cloud-based cyber attacks

📖 Read

via "ITPro".
📢 2022 IBM's Security X-Force cloud threat landscape report 📢

Recommendations for preparing and responding to cloud breaches

📖 Read

via "ITPro".
👍1
CVE-2022-45908

In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.

📖 Read

via "National Vulnerability Database".
CVE-2022-45909

drachtio-server 0.8.18 has a heap-based buffer over-read via a long Request-URI in an INVITE request.

📖 Read

via "National Vulnerability Database".
CVE-2022-45907

In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.

📖 Read

via "National Vulnerability Database".
Chrome fixes 8th zero-day of 2022 – check your version now

There isn't a rhyme to remind you which months have browser zero-days... you just have to keep your eyes and ears open!

📖 Read

via "Naked Security".
👍1
📢 Avast Premium Business Security review: Feature-rich endpoint management for SMBs 📢

Avast delivers a wealth of tough, easily managed endpoint protection measures at a good price

📖 Read

via "ITPro".
📢 17 Windows 10 problems and how to fix them 📢

Tips and tricks to help you solve Windows 10 upgrade problems, for everything from freeing up storage, to solving privacy errors and using safe mode

📖 Read

via "ITPro".
📢 Interpol arrests nearly 1,000 cyber criminals in months-long anti-fraud operation 📢

Operation HAECHI-III sees the seizure of more than $130 million in virtual assets

📖 Read

via "ITPro".
📢 Google rolls out patch for high-severity Chrome browser zero day 📢

It's the eighth time this year Google has been forced to address a zero-day vulnerability in its world-leading browser

📖 Read

via "ITPro".
CVE-2022-45939

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

📖 Read

via "National Vulnerability Database".
👍1
CVE-2022-43589

A null pointer dereference vulnerability exists in the handle_ioctl_8314C functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
CVE-2022-43590

A null pointer dereference vulnerability exists in the handle_ioctl_0x830a0_systembuffer functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
CVE-2022-43588

A null pointer dereference vulnerability exists in the handle_ioctl_83150 functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
🕴 Bring Your Own Key — A Placebo? 🕴

BYOK was envisioned to reduce the risk of using a cloud service provider processing sensitive data, yet there are several deficiencies.

📖 Read

via "Dark Reading".
CVE-2022-3490

The Checkout Field Editor (Checkout Manager) for WooCommerce WordPress plugin before 1.8.0 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present

📖 Read

via "National Vulnerability Database".
CVE-2022-2311

The Find and Replace All WordPress plugin before 1.3 does not sanitize and escape some parameters from its setting page before outputting them back to the user, leading to a Reflected Cross-Site Scripting issue.

📖 Read

via "National Vulnerability Database".
CVE-2022-3822

The Donations via PayPal WordPress plugin before 1.9.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

📖 Read

via "National Vulnerability Database".
CVE-2022-3601

The Image Hover Effects Css3 WordPress plugin through 4.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

📖 Read

via "National Vulnerability Database".
CVE-2021-25059

The Download Plugin WordPress plugin before 2.0.0 does not properly validate a user has the required privileges to access a backup's nonce identifier, which may allow any users with an account on the site (such as subscriber) to download a full copy of the website.

📖 Read

via "National Vulnerability Database".