πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-24346 β€Ό

D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the wan_connected parameter at /goform/formEasySetupWizard3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24345 β€Ό

D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetWanDhcpplus.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Attacker Allure: A Look at the Super Bowl's Operational Cyber-Risks πŸ•΄

Event organizers should be exercising various cyberattack scenarios to ensure they have the proper checks and balances in place to respond accordingly and maintain resilience.

πŸ“– Read

via "Dark Reading".
⚠ S3 Ep121: Can you get hacked and then prosecuted for it? [Audio + Text] ⚠

Latest epsiode. Listen now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Malicious Game Mods Target Dota 2 Game Users πŸ•΄

Valve's unpatched JavaScript engine and incomplete modification vetting process for Steam-delivered mods led to user systems being backdoored.

πŸ“– Read

via "Dark Reading".
⚠ Reddit admits it was hacked and data stolen, says β€œDon’t panic” ⚠

Reddit is suggesting 3 tips as a follow-up to this breach. We agree with 2 of them but not with the 3rd...

πŸ“– Read

via "Naked Security".
πŸ•΄ MagicWeb Mystery Highlights Nobelium Attacker's Sophistication πŸ•΄

The authentication bypass used by the Nobelium group, best known for the supply chain attack on SolarWinds, required a massive, real-time investigation to uncover, Microsoft says.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-46650 β€Ό

Acemanager in ALEOS before version 4.16 allows a user with valid credentials to reconfigure the device to expose the ACEManager credentials on the pre-login status page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46649 β€Ό

Acemanager in ALEOS before version 4.16 allows a user with valid credentials to manipulate the IP logging operation to execute arbitrary shell commands on the device.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits πŸ•΄

The US Treasury Department linked the notorious cybercrime gang to Russian Intelligence Services because cyberattacks that disrupted hospitals and other critical infrastructure align with Russian state interests.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Reddit Hack Shows Limits of MFA, Strengths of Security Training πŸ•΄

A tailored spear-phishing attack successfully convinced a Reddit employee to hand over their credentials and their one-time password, but soon after, the same worker notified security.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-45104 β€Ό

Dell Unisphere for PowerMax vApp, VASA Provider vApp, and Solution Enabler vApp version 9.2.3.x contain a command execution vulnerability. A low privileged remote attacker could potentially exploit this vulnerability, leading to execute arbitrary commands on the underlying system.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ What's the difference between antimalware and antivirus? πŸ“’

We help you navigate the worlds of antimalware and antivirus

πŸ“– Read

via "ITPro".
πŸ“’ Podcast transcript: Uprooting legacy tech πŸ“’

Read the full transcript for this episode of the IT Pro Podcast

πŸ“– Read

via "ITPro".
πŸ“’ AWS malvertising campaign a β€œpotent threat” to users, researchers warn πŸ“’

The recent flurry of β€˜malvertising’ attacks is raising concerns that users face heightened search engine risks

πŸ“– Read

via "ITPro".
πŸ“’ Ryuk, Conti ransomware members hit with UK sanctions in latest crackdown πŸ“’

The move follows a lengthy joint action between UK and US authorities to crack down on cyber criminal gangs

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ The IT Pro Podcast: Uprooting legacy tech πŸ“’

β€˜Remodelling the house’ rather than rebuilding might be the best approach to digital transformation

πŸ“– Read

via "ITPro".
β€Ό CVE-2023-0127 β€Ό

A command injection vulnerability in the firmware_update command, in the device's restricted telnet interface, allows an authenticated attacker to execute arbitrary commands as root.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0782 β€Ό

A vulnerability was found in Tenda AC23 16.03.07.45 and classified as critical. Affected by this issue is the function formSetSysToolDDNS/formGetSysToolDDNS of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220640.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0783 β€Ό

A vulnerability was found in EcShop 4.1.5. It has been classified as critical. This affects an unknown part of the file /ecshop/admin/template.php of the component PHP File Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220641 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".