πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-3106 β€Ό

An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3107 β€Ό

An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4283 β€Ό

A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46342 β€Ό

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46340 β€Ό

A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3108 β€Ό

An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3917 β€Ό

Improper access control of bootloader function was discovered in Motorola Mobility Motorola e20 prior to version RONS31.267-38-8 allows attacker with local access to read partition or RAM data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47410 β€Ό

An issue was discovered in the fp_newsletter (aka Newsletter subscriber management) extension before 1.1.1, 1.2.0, 2.x before 2.1.2, 2.2.1 through 2.4.0, and 3.x before 3.2.6 for TYPO3. Data about subscribers may be obtained via createAction operations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3115 β€Ό

An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46341 β€Ό

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ WithSecure Elements Endpoint Protection review: Holistic protection at a great price πŸ“’

Smart cloud-hosted security offering affordable endpoint protection for a wide range of devices at a good price

πŸ“– Read

via "ITPro".
πŸ“’ Apple issues fix for β€˜actively exploited’ WebKit zero-day vulnerability πŸ“’

The update marks the 10th fix for zero-day vulnerabilities this year

πŸ“– Read

via "ITPro".
πŸ“’ Beyond Identity strikes up strategic partnership with World Wide Technology πŸ“’

WWT will implement Beyond Identity’s authentication platform internally while also acting as a global channel partner

πŸ“– Read

via "ITPro".
πŸ“’ Uber says compromised third-party to blame for data breach πŸ“’

Vulnerable third-party vendor Teqtivity sparks second major incident for Uber in the space of three months

πŸ“– Read

via "ITPro".
πŸ“’ How to implement strong authentication πŸ“’

Strong authentication is hugely important, but implementing any regime at scale is not without its challenges

πŸ“– Read

via "ITPro".
πŸ“’ Cyber attack on Australia’s TPG Telecom affects 15,000 customers πŸ“’

It is the third cyber attack on a major Australian telco since October

πŸ“– Read

via "ITPro".
πŸ“’ Ransomware discovered carrying legitimate Windows certificates πŸ“’

Sophos researchers pointed to the sophisticated signatures as a sign of a new, dangerous strategy by a group tied to Cuba

πŸ“– Read

via "ITPro".
πŸ“’ The pros and cons of facial recognition technology πŸ“’

There are plenty of pros and cons of facial recognition technology, but is it really worth risking user privacy in the name of efficiency and security?

πŸ“– Read

via "ITPro".
πŸ“’ Telstra blames IT blunder for leak of 130,000 customer records πŸ“’

Australia’s biggest telco said that the error was due to a mismanagement of databases and not a cyber attack

πŸ“– Read

via "ITPro".
πŸ“’ Microsoft patches two zero-day vulnerabilities in last Patch Tuesday of 2022 πŸ“’

Zero-days affecting Windows SmartScreen and DirectX were identified in the latest security update

πŸ“– Read

via "ITPro".
πŸ“’ IT Pro 20/20: LinkedIn & the toxic world of cyber security πŸ“’

A look at the shady world of cyber security networking and online communities

πŸ“– Read

via "ITPro".