πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Billions of Devices Open to Wi-Fi Eavesdropping Attacks ❌

The Kr00k bug arises from an all-zero encryption key in Wi-Fi chips that reveals communications from devices from Amazon, Apple, Google, Samsung and others.

πŸ“– Read

via "Threatpost".
πŸ•΄ 'Cloud Snooper' Attack Circumvents AWS Firewall Controls πŸ•΄

Possible nation-state supply chain attack acts like a "wolf in sheep's clothing," Sophos says.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-12882

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-19668

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-17963. Reason: This candidate is a reservation duplicate of CVE-2018-17963. Notes: All CVE users should reference CVE-2018-17963 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-6371

Synchronet BBS 3.16c for Windows allows remote attackers to cause a denial of service (service crash) via a long string in the HTTP Referer header.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-6363

** DISPUTED ** In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for development and testing purposes.'"

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-5861

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-1000020. Reason: This candidate is a reservation duplicate of CVE-2017-1000020. Notes: All CVE users should reference CVE-2017-1000020 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-5686

Parts of the Puppet Enterprise Console 3.x were found to be susceptible to clickjacking and CSRF (Cross-Site Request Forgery) attacks. This would allow an attacker to redirect user input to an untrusted site or hijack a user session.

πŸ“– Read

via "National Vulnerability Database".
⚠ Facebook bans coronavirus β€˜miracle cure’ ads ⚠

Facebook, like other platforms, has seen fake news, mass-buying of face masks, and misinformation about bleach being a cure for COVID-19.

πŸ“– Read

via "Naked Security".
πŸ” Why city and state governments may be unprepared for ransomware attacks πŸ”

Despite the rise in ransomware, a lack of prevention training and stagnant security budgets are putting local governments at risk, according to IBM Security.

πŸ“– Read

via "Security on TechRepublic".
⚠ Chrome 80 encryption change blocks AZORult password stealer ⚠

Evidence is emerging that a change made to Chrome 80 might have disrupted the popular data and user profile stealing malware AZORult.

πŸ“– Read

via "Naked Security".
⚠ Brave beats other browsers in privacy study ⚠

Users looking for a privacy-focused browser might want to consider Brave first, according to a study published this week.

πŸ“– Read

via "Naked Security".
⚠ S2 Ep28: Stalkerware, when cybercrooks return, and phishing gone wild – Naked Security Podcast ⚠

Listen to the latest episode now!

πŸ“– Read

via "Naked Security".
❌ IoT Insecurity: When Your Vacuum Turns on You ❌

From vacuum cleaners to baby monitors, the IoT landscape continues to be plagued by concerning security issues that lead to privacy threats.

πŸ“– Read

via "Threatpost".
⚠ Slickwraps data breach earns scorn for all ⚠

The breach earned derision from both the hacker and observers after another hacker exploited the company's vulnerable setup.

πŸ“– Read

via "Naked Security".
πŸ” How cybercriminals target organizations with new and old security threats πŸ”

Spam, ransomware, and malware continue to haunt organizations, but bad actors are also cooking up new spins on these tried-and-true methods, according to security company Fortinet.

πŸ“– Read

via "Security on TechRepublic".
πŸ” UK company takes retro approach to security πŸ”

Garrison wants to move security away from software and into hardware

πŸ“– Read

via "Security on TechRepublic".
⚠ How one man could have flooded your phone with Microsoft spam ⚠

What a difference one tiny little character can make to a phone number.

πŸ“– Read

via "Naked Security".
πŸ” Cloud misconfigurations are a new risk for the enterprise πŸ”

Cybersecurity is an imperfect science, similar to infectious disease control, according to McAfee CTO.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Intel Analyzes Vulns Reported in its Products Last Year πŸ•΄

A new Intel report looks at the more than 250 CVEs affecting Intel products in 2019.

πŸ“– Read

via "Dark Reading: ".