πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Salt Security lifts lid on new STEP partner program πŸ“’

Initiative's inaugural partners include Bright Security, Invicti, StackHawk, and Contrast Security

πŸ“– Read

via "ITPro".
πŸ•΄ eSentire Labs Open Sources Project to Monitor LLMs πŸ•΄

The eSentire LLM Gateway provides monitoring and governance of ChatGPT and other Large Language Models being used in the organization.

πŸ“– Read

via "Dark Reading".
πŸ•΄ North Korea's Lazarus Group Used GUI Framework to Build Stealthy RAT πŸ•΄

The world's most notorious threat actor is using an unprecedented tactic for sneaking spyware into the IT networks of important companies.

πŸ“– Read

via "Dark Reading".
πŸ“’ β€˜Worst case scenario’ ransomware attack cripples Danish cloud provider πŸ“’

Hundreds of customers in the Nordics have been impacted by the breach

πŸ“– Read

via "ITPro".
🦿 Critical Insight Reports Fewer Cybersecurity Breaches in Health Care, Yet Victim Numbers Are Up in 2023 🦿

A new study by Critical Insight shows that cybersecurity attacks in the health care sector are hitting more individuals and finding vulnerabilities in third-party partners.

πŸ“– Read

via "Tech Republic".
πŸ•΄ 5 Best Practices for Implementing Risk-First Cybersecurity πŸ•΄

Embracing a risk-first mindset empowers organizations to make informed decisions, strengthen security, safeguard valuable assets, and reduce financial impact.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-34040 β€Ό

In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers.Specifically, an application is vulnerable when all of the following are true: * The user does notΓ‚ configure an ErrorHandlingDeserializer for the key and/or value of the record * The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true. * The user allows untrusted sources to publish to a Kafka topicBy default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32516 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GloriaFood Restaurant Menu Γ’β‚¬β€œ Food Ordering System Γ’β‚¬β€œ Table Reservation plugin <=Γ‚ 2.3.6 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32511 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Booking Ultra Pro Booking Ultra Pro Appointments Booking Calendar Plugin plugin <=Γ‚ 1.1.8 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32510 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van Gelder Order Your Posts Manually plugin <=Γ‚ 2.2.5 versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Wireshark Analyzer 4.0.8 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
🦿 How to Remove a Lost Device From Your Google Account 🦿

Follow this guide to learn how to easily remove any device from your Google account and keep your account secure.

πŸ“– Read

via "Tech Republic".
🦿 Google AI in Workspace Adds New Zero-Trust and Digital Sovereignty Controls 🦿

Google announced security enhancements to Google Workspace focused on enhancing threat defense controls with Google AI.

πŸ“– Read

via "Tech Republic".
πŸ•΄ eBay Users Beware Russian 'Telekopye' Telegram Phishing Bot πŸ•΄

Thanks to a simple Telegram bot that democratizes phishing, ordinary Russians can conduct full-fledged phishing attacks with zero technical knowhow.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-34973 β€Ό

An insufficient entropy vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows remote users to predict secret via unspecified vectors.We have already fixed the vulnerability in the following versions:QTS 5.0.1.2425 build 20230609 and laterQTS 5.1.0.2444 build 20230629 and laterQuTS hero h5.1.0.2424 build 20230609 and later

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34971 β€Ό

An inadequate encryption strength vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to decrypt the data using brute force attacks via unspecified vectors.We have already fixed the vulnerability in the following versions:QTS 5.0.1.2425 build 20230609 and laterQTS 5.1.0.2444 build 20230629 and laterQTS 4.5.4.2467 build 20230718 and laterQuTS hero h5.1.0.2424 build 20230609 and laterQuTS hero h4.5.4.2476 build 20230728 and later

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46884 β€Ό

A potential use-after-free vulnerability existed in SVG Images if the Refresh Driver was destroyed at an inopportune time. This could have lead to memory corruption or a potentially exploitable crash.*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 106. This vulnerability affects Firefox < 106.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40706 β€Ό

There is no limit on the number of login attempts in the web server for the SNAP PAC S1 Firmware version R10.3b. This could allow for a brute-force attack on the built-in web server login.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40707 β€Ό

There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don't set up complex credentials.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40708 β€Ό

The File Transfer Protocol (FTP) port is open by default in the SNAP PAC S1 Firmware version R10.3b. This could allow an adversary to access some device files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40710 β€Ό

An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for theΓ‚ SNAP PAC S1 Firmware version R10.3b

πŸ“– Read

via "National Vulnerability Database".