🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Cyber Hygiene: A First Line of Defense Against Evolving Cyberattacks 🕴

Back to basics is a good start, but too often security teams don't handle their deployment correctly. Here's how to avoid the common pitfalls.

📖 Read

via "Dark Reading".
👍1
🕴 The Hot Seat: CISO Accountability in a New Era of SEC Regulation 🕴

Updated cybersecurity regulations herald a new era of transparency and accountability in the face of escalating industry vulnerabilities.

📖 Read

via "Dark Reading".
CVE-2023-41296

Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality.

📖 Read

via "National Vulnerability Database".
CVE-2023-41301

Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally.

📖 Read

via "National Vulnerability Database".
CVE-2023-41303

Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified.

📖 Read

via "National Vulnerability Database".
CVE-2022-48605

Input verification vulnerability in the fingerprint module. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability.

📖 Read

via "National Vulnerability Database".
CVE-2023-41293

Data security classification vulnerability in the DDMP module. Successful exploitation of this vulnerability may affect confidentiality.

📖 Read

via "National Vulnerability Database".
CVE-2023-41295

Vulnerability of improper permission management in the displayengine module. Successful exploitation of this vulnerability may cause the screen to turn dim.

📖 Read

via "National Vulnerability Database".
CVE-2023-41298

Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality.

📖 Read

via "National Vulnerability Database".
CVE-2023-41297

Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking.

📖 Read

via "National Vulnerability Database".
CVE-2023-41419

An issue in Gevent Gevent before version 23.9.1 allows a remote attacker to escalate privileges via a crafted script to the WSGIServer component.

📖 Read

via "National Vulnerability Database".
CVE-2023-41294

The DP module has a service hijacking vulnerability.Successful exploitation of this vulnerability may affect some Super Device services.

📖 Read

via "National Vulnerability Database".
CVE-2023-41299

DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart.

📖 Read

via "National Vulnerability Database".
CVE-2023-41302

Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally.

📖 Read

via "National Vulnerability Database".
CVE-2023-41300

Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart.

📖 Read

via "National Vulnerability Database".
🛠 GNUnet P2P Framework 0.20.0 🛠

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

📖 Read

via "Packet Storm Security".
🛠 Global Socket 1.4.41 🛠

Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.

📖 Read

via "Packet Storm Security".
👍1🔥1
CVE-2023-43256

A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input.

📖 Read

via "National Vulnerability Database".
CVE-2023-43131

General Device Manager 2.5.2.2 is vulnerable to Buffer Overflow.

📖 Read

via "National Vulnerability Database".
CVE-2023-43456

Cross Site Scripting vulnerability in Service Provider Management System v.1.0 allows a remote attacker to execute arbitrary code and obtain sensitive information via the firstname, middlename and lastname parameters in the /php-spms/admin/?page=user endpoint.

📖 Read

via "National Vulnerability Database".
🦿 LogRhythm vs. SolarWinds (2023): SIEM Tool Comparison 🦿

This is an in-depth LogRhythm vs. SolarWinds SIEM tool comparison, covering their key features, pricing, and more. Use this guide to find your best fit.

📖 Read

via "Tech Republic".