Get Mystery Box with random crypto!

🛡 Cybersecurity & Privacy 🛡 - News

Logo of telegram channel cibsecurity — 🛡 Cybersecurity & Privacy 🛡 - News C
Logo of telegram channel cibsecurity — 🛡 Cybersecurity & Privacy 🛡 - News
Channel address: @cibsecurity
Categories: Technologies
Language: English
Subscribers: 19.14K
Description from channel

🗞 The finest daily news on cybersecurity and privacy.
🔔 Daily releases.
💻 Is your online life secure?
📩 lalilolalo.dev@gmail.com

Ratings & Reviews

3.00

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

2

3 stars

0

2 stars

0

1 stars

1


The latest Messages 4

2021-11-05 01:25:35 CVE-2021-43398

Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks.

Read

via "National Vulnerability Database".
34 views22:25
Open / Comment
2021-11-05 01:22:35 How Is Zero Trust Different From Traditional Security?

Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.

Read

via "Dark Reading".
36 views22:22
Open / Comment
2021-11-05 00:52:34 API Security Issues Hinder Application Delivery

A new survey explains why nearly all organizations experience API security problems to varying degrees.

Read

via "Dark Reading".
51 views21:52
Open / Comment
2021-11-05 00:22:34 US Offers $10M Reward For ID, Location of DarkSide Leadership

The State Department offers multimillion-dollar rewards for information related to the leaders and members involved in DarkSide ransomware.

Read

via "Dark Reading".
70 views21:22
Open / Comment
2021-11-05 00:22:33 Ripping Off the Blindfold: Illuminating OT Environments

A security tool monitoring OT devices needs to do so without disrupting operations, which is why the Self-Learning AI acts only on information obtained by passive monitoring of the network.

Read

via "Dark Reading".
68 views21:22
Open / Comment
2021-11-05 00:22:31 Phishing Attack Blends Spoofed Amazon Order and Fraudulent Customer Service Agents

It's the latest in a series of clever brand impersonation scams that use multiple vectors to lure victims.

Read

via "Dark Reading".
61 views21:22
Open / Comment
2021-11-04 23:25:01 CVE-2021-43389

An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.

Read

via "National Vulnerability Database".
79 views20:25
Open / Comment
2021-10-29 19:21:17 GRAudit Grep Auditing Tool 3.2

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility, grep. It's comparable to other static analysis applications like RATS, SWAAT, and flaw-finder while keeping the technical requirements to a minimum and being very flexible.

Read

via "Packet Storm Security".
106 views16:21
Open / Comment
2021-10-29 19:18:16 CVE-2021-39179

DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL Injection vulnerability in the Tracker component in DHIS2 Server allows authenticated remote attackers to execute arbitrary SQL commands via unspecified vectors. This vulnerability affects the `/api/trackedEntityInstances` and `/api/trackedEntityInstances/query` API endpoints in all DHIS2 versions 2.34, 2.35, and 2.36. It also affects versions 2.32 and 2.33 which have reached _end of support_ - exceptional security updates have been added to the latest *end of support* builds for these versions. Versions 2.31 and older are unaffected. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. The vulnerability is not exposed to a non-malicious user - the vulnerability requires a conscious attack to be exploited. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. Security patches are available in DHIS2 versions 2.32-EOS, 2.33-EOS, 2.34.7, 2.35.7, and 2.36.4. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the `/api/trackedEntityInstances`, and `/api/trackedEntityInstances/query` endpoints as a temporary workaround while waiting to upgrade.

Read

via "National Vulnerability Database".
96 views16:18
Open / Comment
2021-10-29 19:18:14 CVE-2021-35237

A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server.

Read

via "National Vulnerability Database".
66 views16:18
Open / Comment