Channel address:
Categories:
Technologies
Language: English
Subscribers:
19.14K
Description from channel
🗞 The finest daily news on cybersecurity and privacy.
🔔 Daily releases.
💻 Is your online life secure?
📩 lalilolalo.dev@gmail.com
Ratings & Reviews
Reviews can be left only by registered users. All reviews are moderated by admins.
5 stars
0
4 stars
2
3 stars
0
2 stars
0
1 stars
1
The latest Messages 4
2021-11-05 01:25:35
CVE-2021-43398 Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks.
Read
via "
National Vulnerability Database".
34 views22:25
2021-11-05 01:22:35
How Is Zero Trust Different From Traditional Security? Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.
Read
via "
Dark Reading".
36 views22:22
2021-11-05 00:52:34
API Security Issues Hinder Application Delivery A new survey explains why nearly all organizations experience API security problems to varying degrees.
Read
via "
Dark Reading".
51 views21:52
2021-11-05 00:22:34
US Offers $10M Reward For ID, Location of DarkSide Leadership The State Department offers multimillion-dollar rewards for information related to the leaders and members involved in DarkSide ransomware.
Read
via "
Dark Reading".
70 views21:22
2021-11-05 00:22:33
Ripping Off the Blindfold: Illuminating OT Environments A security tool monitoring OT devices needs to do so without disrupting operations, which is why the Self-Learning AI acts only on information obtained by passive monitoring of the network.
Read
via "
Dark Reading".
68 views21:22
2021-11-05 00:22:31
Phishing Attack Blends Spoofed Amazon Order and Fraudulent Customer Service Agents It's the latest in a series of clever brand impersonation scams that use multiple vectors to lure victims.
Read
via "
Dark Reading".
61 views21:22
2021-11-04 23:25:01
CVE-2021-43389 An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.
Read
via "
National Vulnerability Database".
79 views20:25
2021-10-29 19:21:17
GRAudit Grep Auditing Tool 3.2 Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility, grep. It's comparable to other static analysis applications like RATS, SWAAT, and flaw-finder while keeping the technical requirements to a minimum and being very flexible.
Read
via "
Packet Storm Security".
106 views16:21
2021-10-29 19:18:16
CVE-2021-39179 DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL Injection vulnerability in the Tracker component in DHIS2 Server allows authenticated remote attackers to execute arbitrary SQL commands via unspecified vectors. This vulnerability affects the `/api/trackedEntityInstances` and `/api/trackedEntityInstances/query` API endpoints in all DHIS2 versions 2.34, 2.35, and 2.36. It also affects versions 2.32 and 2.33 which have reached _end of support_ - exceptional security updates have been added to the latest *end of support* builds for these versions. Versions 2.31 and older are unaffected. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. The vulnerability is not exposed to a non-malicious user - the vulnerability requires a conscious attack to be exploited. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. Security patches are available in DHIS2 versions 2.32-EOS, 2.33-EOS, 2.34.7, 2.35.7, and 2.36.4. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the `/api/trackedEntityInstances`, and `/api/trackedEntityInstances/query` endpoints as a temporary workaround while waiting to upgrade.
Read
via "
National Vulnerability Database".
96 views16:18
2021-10-29 19:18:14
CVE-2021-35237 A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server.
Read
via "
National Vulnerability Database".
66 views16:18