πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Achieving zero trust for corporate networks πŸ“’

Zero trust is a new way of thinking about information security

πŸ“– Read

via "ITPro".
πŸ“’ Orange Cyberdefense collaborates with Microsoft to release two new managed services πŸ“’

New managed workspace protection and XDR offerings aim to help businesses β€œstay ahead of threats”

πŸ“– Read

via "ITPro".
πŸ“’ ZTNA vs on-premises VPN πŸ“’

How ZTNA wins the network security game

πŸ“– Read

via "ITPro".
πŸ“’ Brand-new Emotet campaign socially engineers its way from detection πŸ“’

This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros

πŸ“– Read

via "ITPro".
πŸ“’ The WFH cyber security checklist πŸ“’

Ten ways to win the remote access game with ZTNA

πŸ“– Read

via "ITPro".
πŸ“’ SOC modernisation and and the role of XDR πŸ“’

Security operations remain challenging

πŸ“– Read

via "ITPro".
πŸ“’ Accelerating your IT transformation πŸ“’

How Cloudflare is innovating for CIOs to start 2023

πŸ“– Read

via "ITPro".
πŸ“’ Defending against malware attacks starts here πŸ“’

The ultimate guide to building your malware defence strategy

πŸ“– Read

via "ITPro".
πŸ“’ Meet the charity shaping Australia and New Zealand's data breach response πŸ“’

IDCARE is recruiting a reserve army to turbocharge the fightback against cyber crime not just in the region, but in the interests of victims all over the world

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ The essential guide to preventing ransomware attacks πŸ“’

Vital tips and guidelines to protect your business using ZTNA and SSE

πŸ“– Read

via "ITPro".
πŸ“’ Balancing network security risks πŸ“’

A CISO’s guide

πŸ“– Read

via "ITPro".
πŸ“’ Kali Linux releases first-ever defensive distro with score of new tools πŸ“’

Kali Purple marks the next step for the red-teaming platform on the project's tenth anniversary

πŸ“– Read

via "ITPro".
πŸ“’ The IT manager's guide to getting home in time for dinner πŸ“’

A cloud based networking solution that does away with configurations

πŸ“– Read

via "ITPro".
πŸ•΄ Leveraging Behavioral Analysis to Catch Living-Off-the-Land Attacks πŸ•΄

Attackers are increasingly staying under the radar by using your own tools against you. Only behavioral AI can catch these stealthy attacks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-21465 β€Ό

Improper access control vulnerability in BixbyTouch prior to version 3.2.02.5 in China models allows untrusted applications access local files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21457 β€Ό

Improper access control vulnerability in Bluetooth prior to SMR Mar-2023 Release 1 allows attackers to send file via Bluetooth without related permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21462 β€Ό

The sensitive information exposure vulnerability in Quick Share Agent prior to versions 3.5.14.18 in Android 12 and 3.5.16.20 in Android 13 allows to local attacker to access MAC address without related permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21463 β€Ό

Improper access control vulnerability in MyFiles application prior to versions 12.2.09.0 in Android 11, 13.1.03.501 in Android 12 and 14.1.03.0 in Android 13 allows local attacker to get sensitive information of secret mode in Samsung Internet application with specific conditions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0598 β€Ό

GE Digital Proficy iFIX 2022, GE Digital Proficy iFIX v6.1, and GE Digital Proficy iFIX v6.5 are vulnerable to code injection, which may allow an attacker to insert malicious configuration files in the expected web server execution path and gain full control of the HMI software.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43604 β€Ό

An out-of-bounds write vulnerability exists in the GetAttributeList attribute_count_request functionality of EIP Stack Group OpENer development commit 58ee13c. A specially crafted EtherNet/IP request can lead to an out-of-bounds write, potentially causing the server to crash or allow for remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21461 β€Ό

Improper authorization vulnerability in AutoPowerOnOffConfirmDialog in Settings prior to SMR Mar-2023 Release 1 allows local attacker to turn device off via unprotected activity.

πŸ“– Read

via "National Vulnerability Database".