πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
‼️CVE-2023-6540‼️

A vulnerability was reported in the Lenovo Browser Mobile and Lenovo Browser HD Apps for Android that could allow an attacker to craft a payload that could result in the disclosure of sensitive information.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2023-50256‼️

Froxlor is open source server administration software. Prior to version 2.1.2, it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements e.g. surname, company name established by the system. Version 2.1.2 fixes this issue.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2023-5138‼️

Glitch detection is not enabled by default for the CortexM33 core in Silicon Labs secure vault high parts EFx32xG2xB, except EFR32xG21B.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-21634‼️

Amazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential denialofservice issue exists in ionjava for applications that use ionjava to deserialize Ion text encoded data, or deserialize Ion text or binary encoded data into the IonValue model and then invoke certain IonValue methods on that inmemory representation. An actor could craft Ion data that, when loaded by the affected application andor processed using the IonValue model, results in a StackOverflowError originating from the ionjava library. The patch is included in ionjava 1.10.5. As a workaround, do not load data which originated from an untrusted source or that could have been tampered with.

πŸ“– Read more

Via "National Vulnerability Database"
πŸ–‹οΈ Mandiant's Twitter Account Restored After Six-Hour Crypto Scam Hack πŸ–‹οΈ

American cybersecurity firm and Google Cloud subsidiary Mandiant had its X (formerly Twitter) account compromised for more than six hours by an unknown attacker to propagate a cryptocurrency scam.As of writing, the account has been restored on the social media platform.It's currently not clear how the account was breached. But the hacked Mandiant account was initially renamed to "@

πŸ“– Read

via "The Hacker News".
πŸ“” Nigerian Faces $7.5m BEC Charges After Charities Are Swindled πŸ“”

A Nigerian man is facing a 100-year jail term after being arrested on multimillion-dollar BEC charges

πŸ“– Read

via "Infosecurity Magazine".
πŸ“” Experts Clash Over Ransomware Payment Ban πŸ“”

Emsisoft has called for a complete ban on ransomware payments after another record-breaking year of attacks

πŸ“– Read

via "Infosecurity Magazine".
πŸ“’ UK small businesses plan to ramp up tech investment in 2024 πŸ“’

Small business tech investment will be a key focus in the year ahead, but many could struggle to implement new tools

πŸ“– Read

via "ITPro".
πŸ–‹οΈ Beware: 3 Malicious PyPI Packages Found Targeting Linux with Crypto Miners πŸ–‹οΈ

Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source repository with capabilities to deploy a cryptocurrency miner on affected Linux devices.The three harmful packages, named modularseven, driftme, and catme, attracted a total of 431 downloads over the past month before they were taken down.β€œThese packages, upon initial use, deploy a CoinMiner

πŸ“– Read

via "The Hacker News".
πŸ“’ LastPass is getting stricter on master passwords in the wake of a disastrous 2022 security breach πŸ“’

A minimum character length for LastPass master passwords will now be enforced to reflect β€œheightened threat levels”

πŸ“– Read

via "ITPro".
πŸ“’ Accenture brings on 400 tech staff as 6point6 acquisition clears πŸ“’

Completion of the deal marks the latest in a series of takeovers by Accenture

πŸ“– Read

via "ITPro".
πŸ–‹οΈ Three Ways To Supercharge Your Software Supply Chain Security πŸ–‹οΈ

Section four of the "Executive Order on Improving the Nation’s Cybersecurity" introduced a lot of people in tech to the concept of a β€œSoftware Supply Chain” and securing it. If you make software and ever hope to sell it to one or more federal agencies, you have to pay attention to this. Even if you never plan to sell to a government, understanding your Software Supply Chain and

πŸ“– Read

via "The Hacker News".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.8 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Read

via "Packet Storm Security".
πŸ‘1
πŸ“” HealthEC Data Breach Impacts 4.5 Million Patients πŸ“”

HealthEC said that sensitive medical data was exposed in the breach, which is now thought to have impacted 4.5 million people

πŸ“– Read

via "Infosecurity Magazine".
πŸ•΄ 'Cyber Toufan' Hacktivists Leaked 100-Plus Israeli Orgs in One Month πŸ•΄

A new threat actor just concluded a month and a half of two major leaks per day. Now comes phase two: follow-on attacks.

πŸ“– Read

via "Dark Reading".
πŸ“” Using Stronger Passwords Among Top 2024 Digital Resolutions πŸ“”

Security measures top Kaspersky’s annual digital resolutions survey

πŸ“– Read

via "Infosecurity Magazine".
πŸ•΄ Navigating the New Age of Cybersecurity Enforcement πŸ•΄

The SolarWinds SEC lawsuit illuminates the potential risks faced by CISOs and other cybersecurity executives.

πŸ“– Read

via "Dark Reading".
❀1
πŸ“’ 11 million SSH servers are at risk of Terrapin attacks, here's how to protect yourself πŸ“’

Millions of SSH servers are potentially vulnerable to Terrapin attacks, with experts urging organizations to remain vigilant

πŸ“– Read

via "ITPro".
πŸ“’ 23andMe risks public relations disaster as it blames customers for data breach πŸ“’

23andMe has hit back at customers affected by a recent data breach with suggestions they’re at fault

πŸ“– Read

via "ITPro".
πŸ“’ HealthEC incident shows healthcare data breaches are getting out of control πŸ“’

The latest data breach at HealthEC draws attention to healthcare’s endemic cyber security problem

πŸ“– Read

via "ITPro".
πŸ“” Ukraine Blames Russian Sandworm Hackers for Kyivstar Attack πŸ“”

Ukraine’s security service says Sandworm accessed Kyivstar’s system at least six months before launching the attack

πŸ“– Read

via "Infosecurity Magazine".