🔥 Burn Fat Fast. Discover How! 💪

🛡 Cybersecurity & Privacy 🛡 - News

Logo of telegram channel cibsecurity — 🛡 Cybersecurity & Privacy 🛡 - News C
Logo of telegram channel cibsecurity — 🛡 Cybersecurity & Privacy 🛡 - News
Channel address: @cibsecurity
Categories: Technologies
Language: English
Subscribers: 19.31K
Description from channel

🗞 The finest daily news on cybersecurity and privacy.
🔔 Daily releases.
💻 Is your online life secure?
📩 lalilolalo.dev@gmail.com

Ratings & Reviews

3.00

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

2

3 stars

0

2 stars

0

1 stars

1


The latest Messages 13

2021-10-21 21:25:00 Microsoft Launches Security Program for Nonprofits

A new set of security tools is built to assess risk, provide monitoring and notification if an attack occurs, and train IT pros and users.

Read

via "Dark Reading".
54 views18:25
Open / Comment
2021-10-21 20:57:29 Gigabyte Allegedly Hit by AvosLocker Ransomware

If AvosLocker stole Gigabyte's master keys, threat actors could force hardware to download fake drivers or BIOS updates in a supply-chain attack a la SolarWinds.

Read

via "Threat Post".
75 views17:57
Open / Comment
2021-10-21 19:36:55 CVE-2021-42740

The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character.

Read

via "National Vulnerability Database".
114 views16:36
Open / Comment
2021-10-21 19:24:54 Macs Still Targeted Mostly With Adware, Less With Malware

The top 10 categories of digital threats on macOS are all adware programs, with only a sliver of the share of victims affected by actual malware, according to an IT management firm.

Read

via "Dark Reading".
118 views16:24
Open / Comment
2021-10-21 18:43:14 S3 Ep55: Live malware, global encryption, dating scams, and secret emanations [Podcasts]

Latest episode - listen now! (And sign up for our forthcoming Live Malware Demo at the same time.)

Read

via "Naked Security".
129 views15:43
Open / Comment
2021-10-19 23:33:47 CVE-2021-31381

A configuration weakness in the JBoss Application Server (AppSvr) component of Juniper Networks SRC Series allows a remote attacker to send a specially crafted query to cause the web server to delete files which may allow the attacker to disrupt the integrity and availability of the system.

Read

via "National Vulnerability Database".
37 views20:33
Open / Comment
2021-10-19 23:33:43 CVE-2021-31376

An Improper Input Validation vulnerability in Packet Forwarding Engine manager (FXPC) process of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) by sending specific DHCPv6 packets to the device and crashing the FXPC service. Continued receipt and processing of this specific packet will create a sustained Denial of Service (DoS) condition. This issue affects only the following platforms in ACX Series: ACX500, ACX1000, ACX1100, ACX2100, ACX2200, ACX4000, ACX5048, ACX5096 devices. Other ACX platforms are not affected from this issue. This issue affects Juniper Networks Junos OS on ACX500, ACX1000, ACX1100, ACX2100, ACX2200, ACX4000, ACX5048, ACX5096: 18.4 version 18.4R3-S7 and later versions prior to 18.4R3-S8. This issue does not affect: Juniper Networks Junos OS 18.4 versions prior to 18.4R3-S7 on ACX500, ACX1000, ACX1100, ACX2100, ACX2200, ACX4000, ACX5048, ACX5096.

Read

via "National Vulnerability Database".
36 views20:33
Open / Comment
2021-10-19 23:33:42 CVE-2021-31371

Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It was discovered that packets utilizing these IP addresses may egress an QFX5110 switch, leaking configuration information such as heartbeats, kernel versions, etc. out to the Internet, leading to an information exposure vulnerability. This issue affects: Juniper Networks Junos OS on QFX5110 Series: All versions prior to 17.3R3-S12; 18.1 versions prior to 18.1R3-S13; 18.3 versions prior to 18.3R3-S5; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S3; 19.4 versions prior to 19.4R1-S4, 19.4R3-S5; 20.1 versions prior to 20.1R2-S2, 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S1, 20.4R3; 21.1 versions prior to 21.1R1-S1, 21.1R2;

Read

via "National Vulnerability Database".
29 views20:33
Open / Comment
2021-10-19 09:26:46 7 Cross-Industry Technology Trends That Will Disrupt the World

Recent McKinsey & Company analysis examines which technologies will have the most momentum in the next ten years. These are the trends security teams need to be aware of in order to protect the organization effectively.

Read

via "Dark Reading".
153 views06:26
Open / Comment
2021-10-19 08:32:42 CVE-2021-20836

Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files.

Read

via "National Vulnerability Database".
170 views05:32
Open / Comment