πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-4417 β€Ό

Improper access controls in the entry duplication component in Devolutions Remote Desktop Manager 2023.2.19 and earlier versions on Windows allows an authenticated user, under specific circumstances, to inadvertently share their personal vault entry with shared vaults via an incorrect vault in the duplication write process.

πŸ“– Read

via "National Vulnerability Database".
🦿 Akamai Report: LockBit, Cl0P Expand Ransomware Efforts 🦿

Phishing is so last year: Akamai's report finds that zero-day and one-day vulnerabilities caused a 143% increase in total ransomware victims.

πŸ“– Read

via "Tech Republic".
πŸ”₯1
β€Ό CVE-2023-25915 β€Ό

Due to improper input validation, a remote attacker could execute arbitrary commands on the target system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38158 β€Ό

Microsoft Edge (Chromium-based) Information Disclosure Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36787 β€Ό

Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25914 β€Ό

Due to improper restriction, attackers could retrieve and read system files of the underlying server through the XML interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25913 β€Ό

Because of an authentication flaw an attacker would be capable of generating a web report that discloses sensitive information such as internal IP addresses, usernames, store names and other sensitive information.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-4302 β€Ό

A missing permission check in Jenkins Fortify Plugin 22.1.38 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Ivanti Issues Fix for Critical Vuln In Its Sentry Gateway Technology πŸ•΄

Security vendor will not say if attackers are already actively exploiting the flaw, as some reports have claimed.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-38906 β€Ό

An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the authentication code for the UDP message.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38908 β€Ό

An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the TSKEP authentication function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38909 β€Ό

An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function.

πŸ“– Read

via "National Vulnerability Database".
❀2
πŸ•΄ Chinese APT Targets Hong Kong in Supply Chain Attack πŸ•΄

Dubbed Carderbee, the group used legitimate software and Microsoft-signed malware to spread the Korplug/PlugX backdoor to various Asian targets.

πŸ“– Read

via "Dark Reading".
πŸ“’ XLoader malware rises again on macOS disguised as β€˜OfficeNote’ app πŸ“’

Mac users menaced by an old malware enemy dressed up as a Microsoft productivity app

πŸ“– Read

via "ITPro".
πŸ•΄ 'Cuba' Ransomware Group Uses Every Trick in the Book πŸ•΄

How a Russian cybercrime group using Cuban Revolution references and iconography has emerged as one of the most profitable ransomware operations.

πŸ“– Read

via "Dark Reading".
πŸ‘2
πŸ•΄ The Physical Impact of Cyberattacks on Cities πŸ•΄

Understanding potential threats and regularly updating response plans are the best lines of defense in the new world of cyberattacks.

πŸ“– Read

via "Dark Reading".
🦿 VMware Explore 2023: Keynote Highlights 🦿

Explore enterprise applications and infrastructure, AI, tools for the remote workforce, machine learning, and more from VMware Explore 2023.

πŸ“– Read

via "Tech Republic".
🦿 VMware Explore 2023: Keynote Highlights 🦿

Explore enterprise applications and infrastructure, AI, tools for the remote workforce, machine learning, and more from VMware Explore 2023.

πŸ“– Read

via "Tech Republic".
πŸ•΄ When Leadership Style Is a Security Risk πŸ•΄

Risk-aware leaders can be a cybersecurity advantage. Their flexible leadership style and emphasis on security first help set the tone and demonstrate a commitment to avoiding risk.

πŸ“– Read

via "Dark Reading".
πŸ‘1
⚠ β€œSnakes in airplane mode” – what if your phone says it’s offline but isn’t? ⚠

WYSIWYG is short for "what you see is what you get". Except when it isn't...

πŸ“– Read

via "Naked Security".
πŸ•΄ Software Makers May Face Greater Liability in Wake of MOVEit Lawsuit πŸ•΄

Makers of vulnerable apps that are exploited in wide-scale supply chain attacks need to improve software security or face steep fines and settlement fees.

πŸ“– Read

via "Dark Reading".