πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-5129 β€Ό

With a specially crafted WebP lossless file, libwebp may write data out of bounds to the heap.The ReadHuffmanCodes() function allocates the HuffmanCode buffer with a size that comes from an array of precomputed sizes: kTableSize. The color_cache_bits value defines which size to use.The kTableSize array only takes into account sizes for 8-bit first-level table lookups but not second-level table lookups. libwebp allows codes that are up to 15-bit (MAX_ALLOWED_CODE_LENGTH). When BuildHuffmanTable() attempts to fill the second-level tables it may write data out-of-bounds. The OOB write to the undersized array happens in ReplicateValue.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to Create and Copy SSH Keys with 2 Simple Commands 🦿

Learn how to create and copy SSH keys using just two simple commands. SSH keys provide a secure and convenient way to authenticate remote servers.

πŸ“– Read

via "Tech Republic".
πŸ•΄ When It Comes to Email Security, The Cloud You Pick Matters πŸ•΄

While cloud-based email offers more security than on-premises, insurance firms say it matters whether you use Microsoft 365 or Google Workspace.

πŸ“– Read

via "Dark Reading".
πŸ€”1
β€Ό CVE-2023-43326 β€Ό

mooSocial v3.1.8 was discovered to contain a cross-site scripting (XSS) vulnerability via the change email function.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-38907 β€Ό

An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via session key in the message function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43278 β€Ό

A Cross-Site Request Forgery (CSRF) in admin_manager.php of Seacms up to v12.8 allows attackers to arbitrarily add an admin account.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4258 β€Ό

In Bluetooth mesh implementation If provisionee has a public key that is sent OOB then during provisioning it can be sent back and will be accepted by provisionee.

πŸ“– Read

via "National Vulnerability Database".
⚠ Update on Naked Security ⚠

To consolidate all of our security intelligence and news in one location, we have migrated Naked Security to the Sophos News platform.

πŸ“– Read

via "Naked Security".
πŸ•΄ Proactive Security: What It Means for Enterprise Security Strategy πŸ•΄

Proactive Security holds the elusive promise of helping enterprises finally get ahead of threats, but CISOs must come to grips with the technological and philosophical change that it brings.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Chad Taps Huawei for Digital Modernization Project πŸ•΄

Fiber optic networks and better connectivity for Chad's users are part of the ICT modernization project with the Chinese networking giant.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Amidst MGM, Caesar's Incidents, Attackers Focus on Luxury Hotels πŸ•΄

A fast-growing cyber campaign solely takes aim at luxury hotel and resort chains, using security-disruptive tactics to spread info-stealing malware.

πŸ“– Read

via "Dark Reading".
🦿 Australian Government’s β€˜Six Cyber Shields’ Is Potentially a Well-Meaning Skills Crisis 🦿

The Australian government’s new national cyber security strategy might have the inadvertent effect of making security efforts even more difficult for businesses by intensifying the current skills shortage.

πŸ“– Read

via "Tech Republic".
πŸ•΄ 4 Pillars for Building a Responsible Cybersecurity Disclosure Program πŸ•΄

Responsible disclosure must strike a balance between the immediate need to protect users and the broader security implications for the entire community.

πŸ“– Read

via "Dark Reading".
❀1
πŸ•΄ Suspicious New Ransomware Group Claims Sony Hack πŸ•΄

A deceitful threat actor claims its biggest haul yet. But what, if any, Sony data does it actually have?

πŸ“– Read

via "Dark Reading".
πŸ•΄ Researchers Uncover RaaS Affiliate Distributing Multiple Ransomware Strains πŸ•΄

Ransomware-as-a-service affiliate ShadowSyndicate is unusual for the size of its malicious infrastructure and the fact that it's distributing seven different ransomware strains.

πŸ“– Read

via "Dark Reading".
🦿 Upgrade Your Cybersecurity With This VPN That’s Only $89 for Three Years 🦿

Windscribe VPN gives you tools to block ads, create a safe hotspot, spoof your location, and more for the 3 years for the best price online.

πŸ“– Read

via "Tech Republic".