πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Stupid security 2022 – this year’s infosec fails πŸ—“οΈ

Epic web security fails and salutary lessons from another inevitably eventful year in infosec

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2018-25058 β€Ό

A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file js/twitterFetcher.js of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 is able to address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4296 β€Ό

A vulnerability, which was classified as problematic, has been found in w3c Unicorn. This issue affects the function ValidatorNuMessage of the file src/org/w3c/unicorn/response/impl/ValidatorNuMessage.java. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 51f75c31f7fc33859a9a571311c67ae4e95d9c68. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217019.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4295 β€Ό

A vulnerability classified as problematic was found in ONC code-validator-api up to 1.0.30. This vulnerability affects the function vocabularyValidationConfigurations of the file src/main/java/org/sitenv/vocabularies/configuration/CodeValidatorApiConfiguration.java of the component XML Handler. The manipulation leads to xml external entity reference. Upgrading to version 1.0.31 is able to address this issue. The name of the patch is fbd8ea121755a2d3d116b13f235bc8b61d8449af. It is recommended to upgrade the affected component. VDB-217018 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
⚠ US passes the Quantum Computing Cybersecurity Preparedness Act – and why not? ⚠

Cryptographic agility: the ability and the willingness to change quickly when needed.

πŸ“– Read

via "Naked Security".
πŸ”₯1
πŸ•΄ New Year's Surprise: Cybersecurity M&A, Funding Activity Snowballs in Q4 πŸ•΄

Concerns about recessionary trends impacting the cybersecurity sector in 2022 remained largely unfounded in Q4, as investment activity surged after a Q3 slowdown.

πŸ“– Read

via "Dark Reading".
πŸ•΄ After the Uber Breach: 3 Questions All CISOs Should Ask Themselves πŸ•΄

How CISOs handle the ethical issues around data breaches can make or break their careers. Don't wait until a breach happens to plot the course forward.

πŸ“– Read

via "Dark Reading".
πŸ‘2
πŸ•΄ 3 Industries, 3 Security Programs πŸ•΄

Security leaders from a media corporation, a commercial real estate company, and an automotive technology company share how they address cyber-risk.

πŸ“– Read

via "Dark Reading".
πŸ‘1πŸ€”1
πŸ•΄ Extracting Encrypted Credentials From Common Tools πŸ•΄

Attackers are harvesting credentials from compromised systems. Here's how some commonly used tools can enable this.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-4849 β€Ό

Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4840 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4839 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4846 β€Ό

Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4843 β€Ό

NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4848 β€Ό

Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4851 β€Ό

Improper Handling of Values in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4850 β€Ό

Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4847 β€Ό

Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4845 β€Ό

Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4844 β€Ό

Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4841 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯2