πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-40633 β€Ό

A malicious actor can clone access cards used to open control cabinets secured with Rittal CMC III locks.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ Highlights from the New U.S. Cybersecurity Strategy β™ŸοΈ

The Biden administration today issued its vision for beefing up the nation's collective cybersecurity posture, including calls for legislation establishing liability for software products and services that are sold with little regard for security. The White House's new national cybersecurity strategy also envisions a more active role by cloud providers and the U.S. military in disrupting cybercriminal infrastructure, and names China as the single biggest cyber threat to U.S. interests.

πŸ“– Read

via "Krebs on Security".
πŸ”₯1
πŸ•΄ IBM Contributes Supply Chain Security Tools to OWASP πŸ•΄

License Scanner and SBOM Utility will boost the capabilities of OWASP's CycloneDX Software Bill of Materials standard.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-1160 β€Ό

Use of Platform-Dependent Third Party Components in GitHub repository cockpit-hq/cockpit prior to 2.4.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0457 β€Ό

Plaintext Storage of a Password vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U(C) CPU modules all models all versions, FX5UJ CPU modules all models all versions, FX5S CPU modules all models all versions, FX5-ENET all versions and FX5-ENET/IP all versions allows a remote unauthenticated attacker to disclose plaintext credentials stored in project files and login into FTP server or Web server.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ CISA: Tech industry 'shouldn't tolerate' Patch Tuesday πŸ“’

CISA director Jen Easterly said the tech industry has allowed the widespread acceptance of "deviant behaviours" to make a mockery of cyber security

πŸ“– Read

via "ITPro".
πŸ“’ Uncovering the ransomware threat from global supply chains πŸ“’

Everything is connected

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ Leaked today, exploited for life πŸ“’

How social media biometric patterns affect your future

πŸ“– Read

via "ITPro".
πŸ“’ The near and far future of ransomware business models πŸ“’

What would make ransomware actors change their criminal business models?

πŸ“– Read

via "ITPro".
πŸ“’ Trend Micro security predictions for 2023 πŸ“’

Prioritise cyber security strategies on capabilities rather than costs

πŸ“– Read

via "ITPro".
πŸ“’ Bitdefender releases free MortalKombat ransomware decryptor tool πŸ“’

While still a relatively new strain, MortalKombat has been used extensively to target users and steal cryptocurrency

πŸ“– Read

via "ITPro".
πŸ“’ Naoris Protocol snaps up former IBM chief scientist to lead its strategy πŸ“’

David Holtzman will lead the mesh security player’s growth strategy across both Web2 and Web3

πŸ“– Read

via "ITPro".
πŸ“’ Supply chain as kill chain πŸ“’

Security in the era Zero Trust

πŸ“– Read

via "ITPro".
πŸ“’ Checkmarx appoints Sandeep Johri as its new CEO πŸ“’

Experienced Silicon Valley executive will lead the applications security provider into its next phase of growth

πŸ“– Read

via "ITPro".
πŸ“’ WH Smith hit by cyber attack, current and former staff data accessed πŸ“’

The company stated that it is notifying staff members who have been affected

πŸ“– Read

via "ITPro".
πŸ“’ Mapping the digital attack surface πŸ“’

Why global organisations are struggling to manage cyber risk

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ•΄ It's Time to Assess the Potential Dangers of an Increasingly Connected World πŸ•΄

With critical infrastructures ever more dependent on the cloud connectivity, the world needs a more stable infrastructure to avoid a crippling cyberattack.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-45552 β€Ό

An Insecure Permissions vulnerability in Shenzhen Zhiboton Electronics ZBT WE1626 Router v 21.06.18 allows attackers to obtain sensitive information via SPI bus interface connected to pinout of the NAND flash memory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45551 β€Ό

An issue discovered in Shenzhen Zhiboton Electronics ZBT WE1626 Router v 21.06.18 allows attackers to escalate privileges via WGET command to the Network Diagnosis endpoint.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45553 β€Ό

An issue discovered in Shenzhen Zhibotong Electronics WBT WE1626 Router v 21.06.18 allows attacker to execute arbitrary commands via serial connection to the UART port.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Wireshark Analyzer 4.0.4 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".