πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Ukraine Blames Russian Sandworm Hackers for Kyivstar Attack πŸ“”

Ukraine’s security service says Sandworm accessed Kyivstar’s system at least six months before launching the attack

πŸ“– Read

via "Infosecurity Magazine".
πŸ“” LastPass Enforces 12-Character Master Passwords πŸ“”

Password manager provider LastPass has started implementing stricter password measures for its customers

πŸ“– Read

via "Infosecurity Magazine".
πŸ•΄ Mandiant's X (Twitter) Account Hacked to Promote Crypto Scam πŸ•΄

The hours-long breach β€” since resolved β€” directed users to a suspicious website as attackers posing as crypto-wallet service Phantom took over the feed of the Google subsidiary.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Administrator Account For Middle East Internet Registry Hacked πŸ•΄

The compromise reportedly led to corruption in the routing of a Spanish telecom provider's network.

πŸ“– Read

via "Dark Reading".
🦿 Intel Spins Off Enterprise Generative AI Deployment Firm Articul8 🦿

Investment firm DigitalBridge Group and other backers provided the cash for the venture, which will enable generative AI deployment.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Russia Kyivstar Hack Should Alarm West, Ukraine Security Chief Warns πŸ•΄

If Ukraine's core telephone network can be taken out, organizations in the West could easily be next, Ukraine's SBU chief says.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Airbus Looks to Acquire Atos Cybersecurity Unit for Nearly $2 Billion πŸ•΄

One of the world's largest aerospace companies is eyeing a cybersecurity upgrade.

πŸ“– Read

via "Dark Reading".
πŸ–±οΈ Say what you will? Your favorite speech-to-text app may be a privacy risk πŸ–±οΈ

Typing with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets.

πŸ“– Read

via "WeLiveSecurity - ESET".
πŸ•΄ Industrial Defender Risk Signal, a Risk-Based Vulnerability Management Solution for OT Security πŸ•΄



πŸ“– Read

via "Dark Reading".
πŸ•΄ C3 Complete Acquires Information Security Business Unit of Compliance Solutions Inc. πŸ•΄



πŸ“– Read

via "Dark Reading".
πŸ•΄ Driven Technologies Expands Expertise With Acquisition of ieMentor πŸ•΄



πŸ“– Read

via "Dark Reading".
‼️CVE-2024-20802‼️

Improper access control vulnerability in Samsung DeX prior to SMR Jan2024 Release 1 allows owner to access other users' notification in a multiuser environment.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-20803‼️

Improper authentication vulnerability in Bluetooth pairing process prior to SMR Jan2024 Release 1 allows remote attackers to establish pairing process without user interaction.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-20804‼️

Path traversal vulnerability in FileUriConverter of MyFiles prior to SMR Jan2024 Release 1 in Android 11 and Android 12, and version 14.5.00.21 in Android 13 allows attackers to write arbitrary file.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-20805‼️

Path traversal vulnerability in ZipCompressor of MyFiles prior to SMR Jan2024 Release 1 in Android 11 and Android 12, and version 14.5.00.21 in Android 13 allows attackers to write arbitrary file.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-20806‼️

Improper access control in Notification service prior to SMR Jan2024 Release 1 allows local attacker to access notification data.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-20807‼️

Implicit intent hijacking vulnerability in Samsung Email prior to version 6.1.90.16 allows attacker to get sensitive information.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-20808‼️

Improper access control vulnerability in Nearby device scanning prior version 11.1.14.7 allows local attacker to access data.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-20809‼️

Improper access control vulnerability in Nearby device scanning prior version 11.1.14.7 allows local attacker to access data.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-0222‼️

Use after free in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. Chromium security severity High

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-0223‼️

Heap buffer overflow in ANGLE in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Chromium security severity High

πŸ“– Read more

Via "National Vulnerability Database"