πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  Richsploit RichFaces Exploitation Toolkit πŸ› 

This tool can be used to exploit vulnerable versions of RichFaces. It has payloads for 4 vulnerabilities that have been identified, which can lead to remote code execution via java deserialization and EL injection.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ Microsoft Exchange Server Flaw Exploited in APT Attacks ❌

A vulnerability is Microsoft Exchange servers is being actively exploited by multiple APT groups, researchers warn.

πŸ“– Read

via "Threatpost".
⚠ It’s not a breach… it’s just that someone else has your data ⚠

If you lose someone's data because of a configuration blunder that lets crooks in without any actual hacking... is that a "breach" or not?

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2016-6918

Lexmark Markvision Enterprise (MVE) before 2.4.1 allows remote attackers to execute arbitrary commands by uploading files. (

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-1159

In ZOHO Password Manager Pro (PMP) 8.3.0 (Build 8303) and 8.4.0 (Build 8400,8401,8402), underprivileged users can obtain sensitive information (entry password history) via a vulnerable hidden service.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-7342

JNews Joomla Component before 8.5.0 allows SQL injection via upload thumbnail, Queue Search Field, Subscribers Search Field, or Newsletters Search Field.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Cyber Resiliency, Cloud & the Evolving Role of the Firewall πŸ•΄

Today's defenses must be creative in both isolating threats and segmenting environments to prevent attacks. Here's why.

πŸ“– Read

via "Dark Reading: ".
πŸ” Federal Employees Worked to Defraud Govt Through Stolen Data πŸ”

A one-time inspector general at the Department of Homeland Security was indicted on Friday on charges he conspired to steal the U.S. government's proprietary software and databases.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2015-7341

JNews Joomla Component before 8.5.0 allows arbitrary File Upload via Subscribers or Templates, as demonstrated by the .php5 extension.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-7340

JEvents Joomla Component before 3.4.0 RC6 has SQL Injection via evid in a Manage Events action.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-7339

JCE Joomla Component 2.5.0 to 2.5.2 allows arbitrary file upload via a .php file extension for an image file to the /com_jce/editor/libraries/classes/browser.php script.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-7338

SQL Injection exists in AcyMailing Joomla Component before 4.9.5 via exportgeolocorder in a geolocation_longitude request to index.php.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2014-1634

SQL Injection exists in Advanced Newsletter Magento extension before 2.3.5 via the /store/advancednewsletter/index/subscribeajax/an_category_id/ PATH_INFO.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-1487

Lexmark Markvision Enterprise before 2.3.0 misuses the Apache Commons Collections Library, leading to remote code execution because of Java deserialization.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-4538

Lexmark X, W, T, E, and C devices before 2012-02-09 allow attackers to obtain sensitive information by reading passwords within exported settings.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2011-3269

Lexmark X, W, T, E, C, 6500e, and 25xxN devices before 2011-11-15 allow attackers to obtain sensitive information via a hidden email address in a Scan To Email shortcut.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Microsoft Disabled Legacy Authentication Across the Company πŸ•΄

The process was not smooth or straightforward, employees say in a discussion of challenges and lessons learned during the multi-year project.

πŸ“– Read

via "Dark Reading: ".
❌ Spear-Phishing Attack Lures Victims With β€˜HIV Results’ ❌

Attackers are purporting to send victims HIV test results - but in reality are convincing them to download the Koadic RAT.

πŸ“– Read

via "Threatpost".
⚠ Phone carriers may soon be forced to adopt anti-robocall tech ⚠

US carriers haven't been doing enough to block robocalls voluntarily. The Federal Communications Commission's response? Fine - we'll make you.

πŸ“– Read

via "Naked Security".
πŸ•΄ Keys to Hiring Cybersecurity Pros When Certification Can't Help πŸ•΄

There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.

πŸ“– Read

via "Dark Reading: ".