๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
ATENTIONโ€ผ New - CVE-2015-3006

On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for some time, but immediately after boot, the entropy is very low. This issue only affects the QFX3500 and QFX3600 switches. No other Juniper Networks products or platforms are affected by this weak entropy vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ” Fraud alert: Voice authentication platform analyzes 1,380 data points per call ๐Ÿ”

Pindrop's dashboard scores the caller, the device, and the behavior to spot bad actors and authentic customers.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ›  SerialTweaker 1.1 ๐Ÿ› 

SerialTweaker is a tool that can be used to load a serialized object, change its contents, and reserialize it to a new serialized object with modified fields inside.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
๐Ÿ›  nfstream 3.2.2 ๐Ÿ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
ATENTIONโ€ผ New - CVE-2019-17026

Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1.

๐Ÿ“– Read

via "National Vulnerability Database".
โš  Monday review โ€“ the hot 23 stories of the week โš 

From Chrome's mystery zero-day to why the EC has switched to Signal, get yourself up to date with everything we've written in the last week.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ” 5G and IoT security: Why cybersecurity experts are sounding an alarm ๐Ÿ”

Without regulation and strong proactive measures, 5G networks remain vulnerable to cyberattacks, and the responsibility falls on businesses and governments.

๐Ÿ“– Read

via "Security on TechRepublic".
โš  Facebook sues data analytics firm OneAudience over malicious SDK โš 

Facebook says OneAudience paid developers to install its social-media-profile-looting SDK into their apps to get marketing data for clients.

๐Ÿ“– Read

via "Naked Security".
โš  Fresh phish! Stripe scam baked and delivered in under an hour โš 

Less than an hour after the crooks registered their scamming domain, the phishing attack was under way.

๐Ÿ“– Read

via "Naked Security".
โš  Ironpie robot vacuum can suck up your privacy โš 

You might want to unplug this not-so-smart robot: researchers found they can watch video streams piped out from its security camera.

๐Ÿ“– Read

via "Naked Security".
โš  Letโ€™s Encrypt issues one billionth free certificate โš 

Thanks to this flood of free certificates, the web is a lot more encrypted than it was a few years ago.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ•ด What Disney+ Can Teach Businesses About Customer Security ๐Ÿ•ด

Businesses must prioritize customer protection by taking on some of the responsibility to prevent credential stuffing attacks through multipronged authentication and identity management.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2018-17058

An issue was discovered in JABA XPress Online Shop through 2018-09-14. It contains an arbitrary file upload vulnerability in the picture-upload feature of ProductEdit.aspx. An authenticated attacker may bypass the frontend filename validation and upload an arbitrary file via FileUploader.aspx.cs in FileUploader.aspx by using empty w and h parameters. This file may contain arbitrary aspx code that may be executed by accessing /Jec/ProductImages/<number>/<filename>. Accessing the file once uploaded does not require authentication.

๐Ÿ“– Read

via "National Vulnerability Database".
โŒ Walgreens Mobile App Leaks Prescription Data โŒ

A security error in the Walgreens mobile app may have leaked customers' full names, prescriptions and shipping addresses.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด Name That Toon: Holy Cow! ๐Ÿ•ด

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Morphisec is using the Windows 10 transition to help companies boost security ๐Ÿ”

Morphisec combines the anti-virus protection in the new Microsoft OS with its own defenses against malware.

๐Ÿ“– Read

via "Security on TechRepublic".
โŒ TrickBot Adds ActiveX Control, Hides Dropper in Images โŒ

The tricky trojan has evolved again, to stay a step ahead of defenders.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ•ด Tesla, SpaceX Parts Manufacturer Suffers Data Breach ๐Ÿ•ด

Visser Precision has confirmed a security incident likely caused by the data-stealing DoppelPaymer ransomware.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2019-12183

Incorrect Access Control in Safescan Timemoto TM-616 and TA-8000 series allows remote attackers to read any file via the administrative API.

๐Ÿ“– Read

via "National Vulnerability Database".