πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Atlassian breach sparks brief blame game with app provider πŸ“’

Atlassian and a third-party app provider, Envoy, both presented contesting claims over the source of the breach

πŸ“– Read

via "ITPro".
πŸ“’ MSSPs report a surge in customer demand for dark web intelligence πŸ“’

Latest research finds that over half of MSSPs in the US and UK are now undertaking dark web monitoring

πŸ“– Read

via "ITPro".
πŸ“’ Gatewatcher to begin β€œaggressive” UK channel partner recruitment drive πŸ“’

The French cyber firm expects its indirect strategy to yield 20-30% growth

πŸ“– Read

via "ITPro".
πŸ“’ How IT professionals can get into cyber security πŸ“’

The widely known cyber security skills gap might tempt IT professionals into a career change, but what’s the best way to navigate this switch?

πŸ“– Read

via "ITPro".
πŸ“’ Microsoft patches three zero days, 77 security vulnerabilities in February Patch Tuesday πŸ“’

Microsoft’s February update contains the largest number of fixes for SQL Server vulnerabilities in several years and nine 'critical' RCE flaws

πŸ“– Read

via "ITPro".
πŸ“’ Cisco issues patch for critical vulnerability in open source ClamAV antivirus πŸ“’

Cisco said there is no evidence to suggest the vulnerability has been actively exploited

πŸ“– Read

via "ITPro".
πŸ“’ Accelerating your IT transformation πŸ“’

How Cloudflare is innovating for CIOs to start 2023

πŸ“– Read

via "ITPro".
πŸ“’ LockBit set Royal Mail ransom at Β£65 million πŸ“’

The leak offers a rare and unique insight into the negotiations tactics of both LockBit and the UK's NCSC

πŸ“– Read

via "ITPro".
πŸ“’ A roadmap to Zero Trust with Cloudflare and CrowdStrike πŸ“’

Achieve end-to-end protection across endpoints, networks, and applications

πŸ“– Read

via "ITPro".
πŸ“’ Cyber security certification vs degree πŸ“’

There are benefits to taking either a cyber security certification or a degree, but they might be suitable for different levels of experience and ambition

πŸ“– Read

via "ITPro".
πŸ“’ Paessler PRTG Network Monitor 22.4 review: Extremely versatile network monitoring πŸ“’

With all sensors included in the price, PRTG is a great choice for SMBs that want the big network picture

πŸ“– Read

via "ITPro".
⚠ Coinbase breached by social engineers, employee data stolen ⚠

Another day, another "sophisticated" attack. This time, the company has handily included some useful advice along with its mea culpa...

πŸ“– Read

via "Naked Security".
πŸ•΄ Name That Toon: Join the Club πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Coinbase Crypto Exchange Ensnared in 'Oktapus'-Related Smishing Attack πŸ•΄

Some employees' personal data was leaked, but the company responded swiftly to a socially engineered incident that gained access to legitimate employee login credentials.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Third-Party Providers Create Identity and Access Control Challenges for Fintech Apps πŸ•΄

Fintech has drastically shifted the financial services industry toward digital technologies and, in so doing, has introduced a variety of new risks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Israel's Top Tech University Targeted by DarkBit Ransomware πŸ•΄

An Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send a political message β€” and maybe something more.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2017-20178 β€Ό

** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Codiad 2.8.0. It has been rated as problematic. Affected by this issue is the function saveJSON of the file components/install/process.php. The manipulation of the argument data leads to information disclosure. The attack may be launched remotely. Upgrading to version 2.8.1 is able to address this issue. The name of the patch is 517119de673e62547ee472a730be0604f44342b5. It is recommended to upgrade the affected component. VDB-221498 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2015-10085 β€Ό

A vulnerability was found in GoPistolet. It has been declared as problematic. This vulnerability affects unknown code of the component MTA. The manipulation leads to denial of service. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is b91aa4674d460993765884e8463c70e6d886bc90. It is recommended to apply a patch to fix this issue. VDB-221506 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0943 β€Ό

A vulnerability, which was classified as problematic, has been found in SourceCodester Best POS Management System 1.0. This issue affects some unknown processing of the file index.php?page=site_settings of the component Image Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221591.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-48282 β€Ό

Under very specific circumstances (see Required configuration section below), a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0942 β€Ό

The Japanized For WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the Γ’β‚¬ΛœtabÒ€ℒ parameter in versions up to, and including, 2.5.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".